Gitlab Vulnerability (CVE-2026-1090)
CVE-2026-1090
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markd...
Overview
A high-severity security vulnerability has been identified in GitLab Community Edition (CE) and Enterprise Edition (EE). Tracked as CVE-2026-1090, this flaw could allow an attacker to execute malicious JavaScript code in a victim’s web browser, potentially compromising user sessions and data.
Vulnerability Details
This is a Cross-Site Scripting (XSS) vulnerability within GitLab’s markdown processing feature. Specifically, the issue exists when a specific feature flag, named markdown_placeholders, is enabled on the instance. Under this condition, GitLab did not properly sanitize (clean) placeholder content entered into markdown fields. An authenticated user-anyone with a valid login-could exploit this by injecting malicious scripts into markdown content, such as in issues, merge requests, or comments.
Impact and Risk
With a high CVSS score of 8.7, this vulnerability poses a significant risk. Successful exploitation could allow an attacker to:
- Hijack user sessions by stealing authentication cookies.
- Perform actions on behalf of the victim without their consent.
- Deface pages or redirect users to malicious websites.
- Potentially access sensitive data visible in the user’s browser session.
This could lead to a serious data breach or system compromise. For more on the consequences of such incidents, recent data breach reports are available at breach reports.
Affected Versions
The vulnerability impacts multiple versions of GitLab CE/EE:
- All versions starting from 10.6 up to, but not including, 18.7.6
- All versions of 18.8 up to, but not including, 18.8.6
- All versions of 18.9 up to, but not including, 18.9.2
Remediation and Mitigation
The primary and most critical action is to update your GitLab installation immediately to a patched version.
Immediate Action:
- Upgrade GitLab to one of the following secure versions:
- GitLab 18.7.6
- GitLab 18.8.6
- GitLab 18.9.2 or later Follow the official GitLab upgrade instructions.
Temporary Mitigation (if immediate upgrade is not possible):
- Disable the feature flag. Administrators can disable the
markdown_placeholdersfeature flag system-wide. This will prevent exploitation of this specific vulnerability but may affect functionality for users relying on this feature.- This can be done via the GitLab Rails console:
Feature.disable(:markdown_placeholders)
- This can be done via the GitLab Rails console:
All administrators should prioritize applying these updates. For ongoing updates on such critical vulnerabilities, follow the latest developments at security news.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
GitLab has remediated a vulnerability in the Duo Workflow Service component of GitLab AI Gateway affecting all versions of the AI Gateway from 18.1.6, 18.2.6, 18.3.1 to 18.6.1, 18.7.0, and 18.8.0 in w...
Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to th...
Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which do...
A Stored Cross-Site Scripting vulnerability was discovered in the Assets and Nodes functionality due to improper validation of an input parameter. An authenticated user with custom fields privileges c...