CVE-2025-11984 PUBLISHED

Authentication Bypass Using an Alternate Path or Channel in GitLab

Assigner: GitLab
Reserved: 20.10.2025 Published: 11.12.2025 Updated: 26.02.2026

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 6.8

Product Status

Vendor GitLab
Product GitLab
Versions Default: unaffected
  • affected from 13.1 to 18.4.6 (excl.)
  • affected from 18.5 to 18.5.4 (excl.)
  • affected from 18.6 to 18.6.2 (excl.)

Solutions

Upgrade to versions 18.4.6, 18.5.4, 18.6.2 or above.

Credits

  • Thanks [jcarre](https://hackerone.com/jcarre) for reporting this vulnerability through our HackerOne bug bounty program finder

References

Problem Types

  • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE