Cyber Posture

CVE-2026-4922

High

Published: 22 April 2026

Published
22 April 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0001 1.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4922 is a high-severity CSRF (CWE-352) vulnerability in Gitlab Gitlab. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious Link (T1204.001); ranked at the 1.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious Link (T1204.001) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-23 requires protections for session authenticity such as CSRF tokens to prevent unauthenticated attackers from forging GraphQL mutation requests on behalf of authenticated users.

prevent

SI-10 mandates validation of information inputs like GraphQL mutations to ensure inclusion of valid CSRF tokens, directly countering the insufficient CSRF protection flaw.

preventrecover

SI-2 requires timely identification, reporting, and correction of flaws like this CSRF vulnerability through patching to GitLab versions 18.9.6, 18.10.4, or 18.11.1.

MITRE ATT&CK Enterprise TechniquesAI

T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
Why these techniques?

The CSRF vulnerability description explicitly describes the attack vector as tricking an authenticated user into clicking a crafted link or visiting a malicious webpage to execute unauthorized GraphQL mutations, directly mapping to malicious link delivery and spearphishing link techniques.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute GraphQL mutations on behalf of authenticated users due to…

more

insufficient CSRF protection.

Deeper analysisAI

CVE-2026-4922 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, affecting GitLab Community Edition (CE) and Enterprise Edition (EE) in all versions from 17.0 prior to 18.9.6, 18.10 prior to 18.10.4, and 18.11 prior to 18.11.1. The flaw stems from insufficient CSRF protection, enabling an unauthenticated user to execute GraphQL mutations on behalf of authenticated users. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N), indicating high severity due to network accessibility, low complexity, and significant impacts on confidentiality and integrity.

An unauthenticated attacker can exploit this vulnerability by tricking an authenticated GitLab user into interacting with a malicious resource, such as clicking a crafted link or visiting a malicious webpage. This user interaction (UI:R) allows the attacker to forge requests that execute unauthorized GraphQL mutations with the victim's elevated privileges, potentially enabling actions like data modification, access to sensitive information, or other privilege-escalating operations depending on the targeted mutations and user permissions.

GitLab has remediated the issue through patch releases, as detailed in the advisory for GitLab 18.11.1 and referenced in the associated work item and HackerOne report. Affected instances should be upgraded to GitLab 18.9.6, 18.10.4, 18.11.1, or later versions to mitigate the vulnerability.

Details

CWE(s)

Affected Products

gitlab
gitlab
18.11.0 · 17.0.0 — 18.9.6 · 17.0.0 — 18.9.6 · 18.10.0 — 18.10.4

CVEs Like This One

CVE-2026-3857Same product: Gitlab Gitlab
CVE-2024-1211Same product: Gitlab Gitlab
CVE-2026-1092Same product: Gitlab Gitlab
CVE-2025-12664Same product: Gitlab Gitlab
CVE-2026-3988Same product: Gitlab Gitlab
CVE-2025-14513Same product: Gitlab Gitlab
CVE-2024-9870Same product: Gitlab Gitlab
CVE-2025-7659Same product: Gitlab Gitlab
CVE-2025-2242Same product: Gitlab Gitlab
CVE-2025-0314Same product: Gitlab Gitlab

References