GitLab Security Update Fixes High-Severity CVE-2026-5173, 11 Other Flaws

Critical GitLab Security Update Targets High-Severity Flaws
GitLab security update covers a high-severity vulnerability tracked as CVE-2026-5173, which impacts websocket connections. This flaw could allow an authenticated attacker to bypass access controls and invoke unintended server-side methods. With a CVSS score of 8.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N), the issue represents a serious risk to affected environments. The vulnerability was discovered internally by GitLab team member Simon Tomlinson. It affects GitLab CE/EE versions from 16.9.6 prior to 18.8.9, version 18.9 before 18.9.5, and version 18.10 before 18.10.3. The latest security patch resolves this issue along with several others.Patch Releases and Affected Versions
The GitLab security update includes patched versions 18.10.3, 18.9.5, and 18.8.9. According to the official release statement: “Today, we are releasing versions 18.10.3, 18.9.5, 18.8.9 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to one of these versions immediately.” GitLab confirmed that users of GitLab.com and GitLab Dedicated services are already protected and do not need to take action.Twelve Vulnerabilities Addressed
This GitLab security update resolves a total of twelve vulnerabilities, ranging from high to low severity. Alongside CVE-2026-5173, several denial-of-service (DoS) vulnerabilities were identified:- CVE-2026-1092: A DoS issue in the Terraform state lock API caused by improper JSON validation (CVSS 7.5).
- CVE-2025-12664: A DoS vulnerability in the GraphQL API that could be triggered through repeated queries (CVSS 7.5).
- CVE-2026-1403: A CSV import flaw allowing authenticated users to disrupt Sidekiq workers (CVSS 6.5).
- CVE-2026-1101: A GraphQL SBOM API issue affecting GitLab EE, also enabling DoS attacks (CVSS 6.5).
- CVE-2026-1516: A code injection issue in Code Quality reports that could expose user IP addresses (CVSS 5.7).
- CVE-2026-4332: A cross-site scripting vulnerability in analytics dashboards (CVSS 5.4).
- CVE-2026-2619: Incorrect authorization in the vulnerability flags AI detection API (CVSS 4.3).
- CVE-2025-9484: Information disclosure via GraphQL queries (CVSS 4.3).
- CVE-2026-1752: Improper access control in the Environments API (CVSS 4.3).
- CVE-2026-2104: Information disclosure through CSV export (CVSS 4.3).