Cyber Posture

CVE-2026-2745

Medium

Published: 25 March 2026

Published
25 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0008 23.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2745 is a medium-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Gitlab Gitlab. Its CVSS base score is 6.8 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-2 (Identification and Authentication (Organizational Users)) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires input validation at system interfaces, addressing the inconsistent input validation flaw in GitLab's WebAuthn authentication process that enables 2FA bypass.

prevent

Ensures unique identification and authentication of organizational users, preventing unauthorized access via WebAuthn 2FA bypass using alternate paths.

prevent

Manages authenticators including WebAuthn mechanisms to protect against misuse and ensure proper validation during the authentication process.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1556.006 Multi-Factor Authentication Defense Impairment
Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts.
Why these techniques?

CVE describes a remote auth bypass in public-facing GitLab WebAuthn 2FA (CWE-288), directly enabling T1190 exploitation of the web app and achieving the effect of T1556.006 MFA bypass for unauthorized account access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 7.11 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to bypass WebAuthn two-factor authentication and gain unauthorized access to user…

more

accounts due to inconsistent input validation in the authentication process.

Deeper analysisAI

CVE-2026-2745 is a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) stemming from inconsistent input validation in the WebAuthn two-factor authentication process. This flaw allows bypassing of WebAuthn 2FA, potentially enabling unauthorized access to user accounts. It affects all versions from 7.11 prior to 18.8.7, 18.9 prior to 18.9.3, and 18.10 prior to 18.10.1. The issue carries a CVSS v3.1 base score of 6.8 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) and maps to CWE-288 (Authentication Bypass Using an Alternate Path or Channel).

An unauthenticated user could exploit this vulnerability over the network to circumvent WebAuthn 2FA protections during authentication, achieving unauthorized access to affected user accounts. The high attack complexity (AC:H) and low privilege requirement (PR:L) per the CVSS vector indicate that exploitation demands specific conditions but could yield high confidentiality and integrity impacts without disrupting availability.

GitLab has remediated the issue with patches released in versions 18.8.7, 18.9.3, and 18.10.1, as detailed in the patch release notes for GitLab 18.10.1. Additional technical details are available in GitLab's internal work item 590810 and the originating HackerOne report 3557844, which security practitioners should review for implementation guidance and verification steps.

Details

CWE(s)

Affected Products

gitlab
gitlab
18.10.0 · 7.11.0 — 18.8.7 · 7.11.0 — 18.8.7 · 18.9.0 — 18.9.3

CVEs Like This One

CVE-2024-9870Same product: Gitlab Gitlab
CVE-2025-9222Same product: Gitlab Gitlab
CVE-2026-0723Same product: Gitlab Gitlab
CVE-2026-5173Same product: Gitlab Gitlab
CVE-2026-1092Same product: Gitlab Gitlab
CVE-2025-13928Same product: Gitlab Gitlab
CVE-2025-0376Same product: Gitlab Gitlab
CVE-2025-14513Same product: Gitlab Gitlab
CVE-2026-1069Same product: Gitlab Gitlab
CVE-2026-1458Same product: Gitlab Gitlab

References