Vulnerability Description
GitLab has remediated an issue in GitLab EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that under certain conditions could have allowed an authenticated user with developer-role permissions to remove code owner approval rules from merge requests due to improper access control.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 11.10.0, < 18.9.7 |
Related Weaknesses (CWE)
References
- https://about.gitlab.com/releases/2026/05/13/patch-release-gitlab-18-11-3-releasRelease Notes
- https://gitlab.com/gitlab-org/gitlab/-/work_items/596332Not Applicable
- https://hackerone.com/reports/3649087Permissions Required
FAQ
What is CVE-2026-6063?
CVE-2026-6063 is a vulnerability with a CVSS score of 4.3 (MEDIUM). GitLab has remediated an issue in GitLab EE affecting all versions from 11.10 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that under certain conditions could have allowed an authenti...
How severe is CVE-2026-6063?
CVE-2026-6063 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6063?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.