CVE-2026-0723

7.4 HIGH

📋 TL;DR

This vulnerability allows an attacker with knowledge of a victim's credential ID to bypass two-factor authentication in GitLab by submitting forged device responses. It affects all GitLab CE/EE installations running vulnerable versions. Users with 2FA enabled are at risk of account takeover.

💻 Affected Systems

Products:
  • GitLab Community Edition
  • GitLab Enterprise Edition
Versions: 18.6.0 to 18.6.3, 18.7.0 to 18.7.1, 18.8.0 to 18.8.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with 2FA enabled. All deployment methods (Omnibus, Docker, Helm, source) are vulnerable.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of any user with 2FA enabled, leading to unauthorized access to repositories, pipelines, secrets, and potential lateral movement within the GitLab instance.

🟠

Likely Case

Targeted attacks against specific users where attackers have obtained credential IDs through other means, resulting in unauthorized access to source code and CI/CD pipelines.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and credential protection are in place, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires knowledge of victim's credential ID, which could be obtained through information disclosure vulnerabilities, logs, or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.6.4, 18.7.2, or 18.8.2

Vendor Advisory: https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab 18.6.4, 18.7.2, or 18.8.2 using your deployment method. 3. For Omnibus: 'sudo apt-get update && sudo apt-get install gitlab-ce=18.8.2-ce.0'. 4. Restart GitLab services.

🔧 Temporary Workarounds

Temporarily disable 2FA

linux

Disable two-factor authentication globally to prevent exploitation while patching.

gitlab-rails runner "ApplicationSetting.first.update!(require_two_factor_authentication: false)"

🧯 If You Can't Patch

  • Implement strict network access controls to limit GitLab access to trusted IPs only
  • Enable enhanced logging and monitoring for authentication events and credential ID exposure

🔍 How to Verify

Check if Vulnerable:

Check GitLab version: 'sudo gitlab-rake gitlab:env:info | grep Version'. If version is 18.6.0-18.6.3, 18.7.0-18.7.1, or 18.8.0-18.8.1, you are vulnerable.

Check Version:

sudo gitlab-rake gitlab:env:info | grep Version

Verify Fix Applied:

Verify version is 18.6.4, 18.7.2, or 18.8.2: 'sudo gitlab-rake gitlab:env:info | grep Version'. Test 2FA login to confirm proper authentication flow.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed 2FA attempts followed by successful authentication with same credential ID
  • Authentication logs showing device response validation failures

Network Indicators:

  • Unusual authentication patterns from unexpected IP addresses
  • Rapid succession of 2FA challenge/response requests

SIEM Query:

source="gitlab.log" AND ("2fa" OR "two_factor") AND ("bypass" OR "failed" OR "invalid_response")

🔗 References

📤 Share & Export