Home

Description

GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in which AI Gateway was vulnerable to insecure template expansion of user supplied data via crafted Duo Agent Platform Flow definitions. This vulnerability could be used to cause Denial of Service or gain code execution on the Gateway. This has been fixed in versions 18.6.2, 18.7.1, and 18.8.1 of the GitLab AI Gateway.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-09 | Updated 2026-02-09 | Assigner GitLab




CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine

Product status

Default status
unaffected

18.1.6 (semver) before 18.6.2
affected

18.7.0 (semver) before 18.7.1
affected

18.8.0 (semver) before 18.8.1
affected

Credits

This vulnerability has been discovered internally by GitLab team member Joern Schneeweisz finder

References

gitlab.com/...l/code-suggestions/ai-assist/-/work_items/1850

about.gitlab.com/...lease-gitlab-ai-gateway-18-8-1-released/

cve.org (CVE-2026-1868)

nvd.nist.gov (CVE-2026-1868)

Download JSON