Vulnerability Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to inject JavaScript in a browser due to improper sanitization of placeholder content in markdown processing.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 10.6.0, < 18.7.6 |
Related Weaknesses (CWE)
References
- https://about.gitlab.com/releases/2026/03/11/patch-release-gitlab-18-9-2-releaseRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/work_items/586478Broken Link
- https://hackerone.com/reports/3502450Permissions Required
FAQ
What is CVE-2026-1090?
CVE-2026-1090 is a vulnerability with a CVSS score of 8.7 (HIGH). GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markd...
How severe is CVE-2026-1090?
CVE-2026-1090 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1090?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.