CVE-2026-6063 PUBLISHED

Authorization Bypass Through User-Controlled Key in GitLab

Assigner: GitLab
Reserved: 10.04.2026 Published: 14.05.2026 Updated: 14.05.2026

GitLab has remediated an issue in GitLab EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that under certain conditions could have allowed an authenticated user with developer-role permissions to remove code owner approval rules from merge requests due to improper access control.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS Score: 4.3

Product Status

Vendor GitLab
Product GitLab
Versions Default: unaffected
  • affected from 11.10 to 18.9.7 (excl.)
  • affected from 18.10 to 18.10.6 (excl.)
  • affected from 18.11 to 18.11.3 (excl.)

Solutions

Upgrade to versions 18.9.7, 18.10.6, 18.11.3 or above.

Credits

  • Thanks [pollito](https://hackerone.com/pollito) for reporting this vulnerability through our HackerOne bug bounty program finder

References

Problem Types

  • CWE-639: Authorization Bypass Through User-Controlled Key CWE