- GitLab patched CVE-2026-0723, a bug that allows 2FA bypass and account takeover
- Additional DoS vulnerabilities in authentication, API endpoints, Wiki and SSH were also fixed
- GitLab encourages immediate upgrades; ~6,000 exposed CE instances remain potential targets
GitLab has fixed a serious vulnerability in their Community Edition and Enterprise Edition (CE/EE) versions that allowed threat actors to bypass two-factor authentication and potentially take over people’s accounts.
“GitLab has fixed an issue that could have allowed someone with existing knowledge of a victim’s credential ID to bypass two-factor authentication by submitting forged device responses,” the company said in a security advisory.
As it explained, the vulnerability was due to unchecked return value in GitLab’s authentication services. As a result, the attackers are able to bypass 2FA for victims whose IDs they knew in advance.
Weird campaign
The bug is now tracked as CVE-2026-0723 and received a high severity score (7.4/10).
It was fixed in version 18.8.2, 18.7.2, 18.6.4 of CE/EE.
In the same patch, GitLab also fixed two additional bugs that allowed attackers to mount denial-of-service (DoS) attacks by sending tailored requests with incorrect authentication data and abusing incorrect authentication validation in API endpoints.
These two bugs are tracked as CVE-2025-13927 and CVE_2025.13928 and affect both CE and EE versions.
GitLab also fixed two DoS bugs that could be triggered by configuring malformed Wiki documents and sending repeated malformed SSH authentication requests. These two are now tracked as CVE-2025-13335 and CVE-2026-1102.
Speaking of the latest patch, GitLab encouraged users to apply it without hesitation:
“These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations immediately upgrade to one of these versions,” GitLab explained. “GitLab.com is already running the patched version. GitLab Dedicated customers do not need to act.”
Referring to Shadowserver data, Bleeping Computer says that there are currently around 6,000 GitLab CE instances exposed online, suggesting that the target landscape is quite large.
The best antivirus for all budgets
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews and opinions in your feeds. Be sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, video unboxings, and get regular updates from us on WhatsApp also.



