{"api_version":"1","generated_at":"2026-05-14T11:44:04+00:00","cve":"CVE-2026-4524","urls":{"html":"https://cve.report/CVE-2026-4524","api":"https://cve.report/api/cve/CVE-2026-4524.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-4524","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-4524"},"summary":{"title":"Authentication Bypass Using an Alternate Path or Channel in GitLab","description":"GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9.1 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an authenticated user to access confidential issue content in public projects without proper authorization due to improper authorization checks.","state":"PUBLISHED","assigner":"GitLab","published_at":"2026-05-14 06:16:23","updated_at":"2026-05-14 06:16:23"},"problem_types":["CWE-288","CWE-288 CWE-288: Authentication Bypass Using an Alternate Path or Channel"],"metrics":[{"version":"3.1","source":"cve@gitlab.com","type":"Secondary","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://gitlab.com/gitlab-org/gitlab/-/work_items/594295","name":"https://gitlab.com/gitlab-org/gitlab/-/work_items/594295","refsource":"cve@gitlab.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://hackerone.com/reports/3597717","name":"https://hackerone.com/reports/3597717","refsource":"cve@gitlab.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-released/","name":"https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-released/","refsource":"cve@gitlab.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-4524","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4524","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"GitLab","product":"GitLab","version":"affected 18.9.1 18.9.7 semver","platforms":[]},{"source":"CNA","vendor":"GitLab","product":"GitLab","version":"affected 18.10 18.10.6 semver","platforms":[]},{"source":"CNA","vendor":"GitLab","product":"GitLab","version":"affected 18.11 18.11.3 semver","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Upgrade to versions 18.9.7, 18.10.6, 18.11.3 or above.","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Thanks [hackaccinocraft](https://hackerone.com/hackaccinocraft) for reporting this vulnerability through our HackerOne bug bounty program","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"cpes":["cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"GitLab","repo":"git://git@gitlab.com:gitlab-org/gitlab.git","vendor":"GitLab","versions":[{"lessThan":"18.9.7","status":"affected","version":"18.9.1","versionType":"semver"},{"lessThan":"18.10.6","status":"affected","version":"18.10","versionType":"semver"},{"lessThan":"18.11.3","status":"affected","version":"18.11","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Thanks [hackaccinocraft](https://hackerone.com/hackaccinocraft) for reporting this vulnerability through our HackerOne bug bounty program"}],"descriptions":[{"lang":"en","value":"GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9.1 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an authenticated user to access confidential issue content in public projects without proper authorization due to improper authorization checks."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-288","description":"CWE-288: Authentication Bypass Using an Alternate Path or Channel","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-14T05:34:52.339Z","orgId":"ceab7361-8a18-47b1-92ba-4d7d25f6715a","shortName":"GitLab"},"references":[{"url":"https://gitlab.com/gitlab-org/gitlab/-/work_items/594295"},{"name":"HackerOne Bug Bounty Report #3597717","tags":["technical-description","exploit","permissions-required"],"url":"https://hackerone.com/reports/3597717"},{"url":"https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-released/"}],"solutions":[{"lang":"en","value":"Upgrade to versions 18.9.7, 18.10.6, 18.11.3 or above."}],"title":"Authentication Bypass Using an Alternate Path or Channel in GitLab"}},"cveMetadata":{"assignerOrgId":"ceab7361-8a18-47b1-92ba-4d7d25f6715a","assignerShortName":"GitLab","cveId":"CVE-2026-4524","datePublished":"2026-05-14T05:34:52.339Z","dateReserved":"2026-03-20T16:34:15.301Z","dateUpdated":"2026-05-14T05:34:52.339Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-14 06:16:23","lastModifiedDate":"2026-05-14 06:16:23","problem_types":["CWE-288","CWE-288 CWE-288: Authentication Bypass Using an Alternate Path or Channel"],"metrics":{"cvssMetricV31":[{"source":"cve@gitlab.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"4524","Ordinal":"1","Title":"Authentication Bypass Using an Alternate Path or Channel in GitL","CVE":"CVE-2026-4524","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"4524","Ordinal":"1","NoteData":"GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9.1 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an authenticated user to access confidential issue content in public projects without proper authorization due to improper authorization checks.","Type":"Description","Title":"Authentication Bypass Using an Alternate Path or Channel in GitL"}]}}}