We found results for “”
CVE-2025-11984
Good to know:
Date: December 11, 2025
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Authentication Bypass Using an Alternate Path or Channel
CWE-288Top Fix
Upgrade Version
Upgrade to version https://gitlab.com/gitlab-org/gitlab.git - v18.4.6-ee;https://gitlab.com/gitlab-org/gitlab.git - v18.5.4-ee;https://gitlab.com/gitlab-org/gitlab.git - v18.6.2-ee
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


