CVE-2026-4922
Published: 22 April 2026
Summary
CVE-2026-4922 is a high-severity CSRF (CWE-352) vulnerability in Gitlab Gitlab. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious Link (T1204.001); ranked at the 1.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-23 requires protections for session authenticity such as CSRF tokens to prevent unauthenticated attackers from forging GraphQL mutation requests on behalf of authenticated users.
SI-10 mandates validation of information inputs like GraphQL mutations to ensure inclusion of valid CSRF tokens, directly countering the insufficient CSRF protection flaw.
SI-2 requires timely identification, reporting, and correction of flaws like this CSRF vulnerability through patching to GitLab versions 18.9.6, 18.10.4, or 18.11.1.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CSRF vulnerability description explicitly describes the attack vector as tricking an authenticated user into clicking a crafted link or visiting a malicious webpage to execute unauthorized GraphQL mutations, directly mapping to malicious link delivery and spearphishing link techniques.
NVD Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute GraphQL mutations on behalf of authenticated users due to…
more
insufficient CSRF protection.
Deeper analysisAI
CVE-2026-4922 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, affecting GitLab Community Edition (CE) and Enterprise Edition (EE) in all versions from 17.0 prior to 18.9.6, 18.10 prior to 18.10.4, and 18.11 prior to 18.11.1. The flaw stems from insufficient CSRF protection, enabling an unauthenticated user to execute GraphQL mutations on behalf of authenticated users. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N), indicating high severity due to network accessibility, low complexity, and significant impacts on confidentiality and integrity.
An unauthenticated attacker can exploit this vulnerability by tricking an authenticated GitLab user into interacting with a malicious resource, such as clicking a crafted link or visiting a malicious webpage. This user interaction (UI:R) allows the attacker to forge requests that execute unauthorized GraphQL mutations with the victim's elevated privileges, potentially enabling actions like data modification, access to sensitive information, or other privilege-escalating operations depending on the targeted mutations and user permissions.
GitLab has remediated the issue through patch releases, as detailed in the advisory for GitLab 18.11.1 and referenced in the associated work item and HackerOne report. Affected instances should be upgraded to GitLab 18.9.6, 18.10.4, 18.11.1, or later versions to mitigate the vulnerability.
Details
- CWE(s)