Unrated severityNVD Advisory· Published Dec 11, 2025· Updated Feb 26, 2026
Authentication Bypass Using an Alternate Path or Channel in GitLab
CVE-2025-11984
Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions.
Affected products
2cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*range: 13.1
- (no CPE)range: >=13.1 <18.4.6, >=18.5 <18.5.4, >=18.6 <18.6.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- hackerone.com/reports/3322714mitretechnical-descriptionexploitpermissions-required
- gitlab.com/gitlab-org/gitlab/-/issues/577847mitreissue-trackingpermissions-required
- about.gitlab.com/releases/2025/12/10/patch-release-gitlab-18-6-2-released/mitre
News mentions
1- GitLab Patch Release: 18.6.2, 18.5.4, 18.4.6GitLab Security Releases · Dec 10, 2025