CVE-2026-1724
Unauthorized Access to GitLab AI Model API Tokens via Access Control Flaw
Publication date: 2026-03-25
Last updated on: 2026-03-26
Assigner: GitLab Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab | From 18.9.0 (inc) to 18.9.3 (exc) |
| gitlab | gitlab | 18.10.0 |
| gitlab | gitlab | From 18.5.0 (inc) to 18.8.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability could allow an unauthenticated user to access API tokens of self-hosted AI models due to improper access control.
Unauthorized access to API tokens may lead to exposure of sensitive data or unauthorized actions, which could impact compliance with data protection regulations such as GDPR or HIPAA.
However, specific impacts on compliance with standards like GDPR or HIPAA are not detailed in the provided information.
Can you explain this vulnerability to me?
This vulnerability in GitLab Enterprise Edition (EE) affects versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1. It allows an unauthenticated user to access API tokens of self-hosted AI models due to improper access control.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to API tokens for self-hosted AI models. This could allow attackers to interact with or manipulate AI models without permission, potentially leading to data exposure or misuse of AI services.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade GitLab EE to a fixed version. Specifically, update to version 18.8.7 or later if you are on the 18.8 branch, 18.9.3 or later if on the 18.9 branch, or 18.10.1 or later if on the 18.10 branch.
This vulnerability allows unauthenticated users to access API tokens of self-hosted AI models due to improper access control, so applying the patch from the vendor is critical.