GitLab CE/EE websocket access bypass (CVE-2026-5173)
CVE-2026-5173
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to invoke un...
Overview
A high-severity improper access control vulnerability, tracked as CVE-2026-5173, has been patched in GitLab Community and Enterprise Editions (CE/EE). This flaw affects a wide range of versions and could allow an authenticated user to invoke unintended server-side methods through websocket connections.
Vulnerability Details
The vulnerability stems from insufficient access controls on websocket endpoints. In affected versions, an authenticated user-requiring only low-level privileges-could send crafted requests via a websocket connection. These requests could trigger server-side methods that the user should not have permission to access. The attack can be launched remotely over the network with low complexity and requires no user interaction, making it a reliable vector for exploitation.
Affected Versions
The vulnerability impacts:
- GitLab CE/EE versions 16.9.6 and later, but before 18.8.9
- All versions from 18.9 before 18.9.5
- All versions from 18.10 before 18.10.3
All deployments, including self-managed and GitLab Dedicated instances, are affected. GitLab.com was already running a patched version at the time of disclosure.
Potential Impact
Successful exploitation could allow an attacker to perform unauthorized actions on the GitLab instance. The specific impact depends on which server-side methods are invoked, but it could potentially lead to data exposure, data manipulation, or disruption of service. The high CVSS score of 8.5 reflects the ease of attack and the potential for significant compromise of the application’s integrity and confidentiality.
Remediation and Mitigation
The primary remediation is immediate patching. Administrators must upgrade their GitLab instances to a secure version:
- Upgrade to GitLab CE/EE 18.8.9, 18.9.5, or 18.10.3 or later.
If immediate patching is not possible, consider restricting network access to the GitLab instance as a temporary measure, limiting exposure to trusted networks only. Ensure you are monitoring for unusual websocket activity or unauthorized administrative actions. For the latest on data exposures, review recent breach reports.
Security Insight
This vulnerability highlights the persistent security challenge of correctly implementing authorization checks for real-time communication channels like websockets, which are often added after core application logic. Similar to past incidents in other platforms, it underscores that access control must be consistently enforced across all entry points, not just traditional HTTP request/response cycles. For ongoing developments in such threats, follow security news.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua usi...
Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to th...
Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which do...
FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the "old password" verifica...