GitLab EE Auth Bypass in MR Approval via Orphaned Policy Cleanup (v15.718.11.3)
CVE-2026-6883 Published on May 14, 2026
Missing Authorization in GitLab
GitLab has remediated an issue in GitLab EE affecting all versions from 15.7 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3 that could have allowed an authenticated user to bypass merge request approval requirements due to improper cleanup of orphaned policy records.
Vulnerability Analysis
CVE-2026-6883 can be exploited with network access, requires user interaction and a small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.
Weakness Type
What is an AuthZ Vulnerability?
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
CVE-2026-6883 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2026-6883
Want to know whenever a new CVE is published for GitLab? stack.watch will email you.
Affected Versions
GitLab:- Version 15.7 and below 18.9.7 is affected.
- Version 18.10 and below 18.10.6 is affected.
- Version 18.11 and below 18.11.3 is affected.