CVE-2026-3607
MEDIUM
4,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none
Description
AI Translation Available
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.3 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an authenticated user with developer-role permissions to bypass package protection rules due to improper access control.
1280
Access Control Check Implemented After Asset is Accessed
IncompleteCommon Consequences
Security Scopes Affected:
Access Control
Confidentiality
Integrity
Potential Impacts:
Modify Memory
Read Memory
Modify Application Data
Read Application Data
Gain Privileges Or Assume Identity
Bypass Protection Mechanism
Applicable Platforms
Languages:
Not Language-Specific, Verilog, VHDL
https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-relea…
https://gitlab.com/gitlab-org/gitlab/-/work_items/592466
https://hackerone.com/reports/3586233