Home

Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.10 before 18.10.4 and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute arbitrary JavaScript in a user's browser session due to improper path validation under certain conditions.

PUBLISHED Reserved 2026-04-08 | Published 2026-04-22 | Updated 2026-04-23 | Assigner GitLab




HIGH: 8.0CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

Problem types

CWE-41: Improper Resolution of Path Equivalence

Product status

Default status
unaffected

18.10 (semver) before 18.10.4
affected

18.11 (semver) before 18.11.1
affected

Credits

Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program finder

References

hackerone.com/reports/3572231 (HackerOne Bug Bounty Report #3572231) technical-description exploit permissions-required

gitlab.com/gitlab-org/gitlab/-/work_items/592816

about.gitlab.com/...2/patch-release-gitlab-18-11-1-released/

cve.org (CVE-2026-5816)

nvd.nist.gov (CVE-2026-5816)

Download JSON