CVE-2026-3607

Published: Mag 14, 2026 Last Modified: Mag 14, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,3
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none

Description

AI Translation Available

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.3 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an authenticated user with developer-role permissions to bypass package protection rules due to improper access control.

1280

Access Control Check Implemented After Asset is Accessed

Incomplete
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity
Potential Impacts:
Modify Memory Read Memory Modify Application Data Read Application Data Gain Privileges Or Assume Identity Bypass Protection Mechanism
Applicable Platforms
Languages: Not Language-Specific, Verilog, VHDL
View CWE Details
https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-relea…
https://gitlab.com/gitlab-org/gitlab/-/work_items/592466
https://hackerone.com/reports/3586233