Vulnerability Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to invoke unintended server-side methods through websocket connections due to improper access control.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 16.9.6, < 18.8.9 |
Related Weaknesses (CWE)
References
- https://about.gitlab.com/releases/2026/04/08/patch-release-gitlab-18-10-3-releasRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/work_items/588959Broken Link
FAQ
What is CVE-2026-5173?
CVE-2026-5173 is a vulnerability with a CVSS score of 8.5 (HIGH). GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to invoke un...
How severe is CVE-2026-5173?
CVE-2026-5173 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5173?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.