CVE-2026-1663 Overview
GitLab has remediated an improper authorization vulnerability (CWE-862) in GitLab CE/EE affecting all versions from 14.4 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2. This vulnerability could allow an authenticated user with group import permissions to create labels in private projects due to improper authorization validation in the group import process under certain circumstances.
Critical Impact
Authenticated attackers with group import permissions can bypass authorization controls to create labels in private projects they should not have access to, potentially affecting project organization and workflow integrity.
Affected Products
- GitLab CE/EE versions 14.4 to 18.7.5
- GitLab CE/EE versions 18.8 to 18.8.5
- GitLab CE/EE versions 18.9 to 18.9.1
Discovery Timeline
- 2026-03-11 - CVE-2026-1663 published to NVD
- 2026-03-11 - GitLab releases security patch (versions 18.7.6, 18.8.6, 18.9.2)
- 2026-03-12 - Last updated in NVD database
Technical Details for CVE-2026-1663
Vulnerability Analysis
This vulnerability is classified as Missing Authorization (CWE-862), which occurs when the software does not perform proper authorization checks before allowing access to a sensitive resource or operation. In this case, the group import functionality in GitLab CE/EE fails to adequately validate whether the authenticated user has the necessary permissions to create labels in target private projects during the import process.
The flaw exists in how GitLab handles authorization validation during group imports. When a user initiates a group import, the system does not properly verify that the user has explicit permission to create labels in all associated private projects. This allows an attacker with basic group import permissions to manipulate the import process to create unauthorized labels in private projects within the group hierarchy.
Root Cause
The root cause stems from inadequate authorization checks in the group import process. The import functionality incorrectly assumes that users with group import permissions automatically have write access to all resources in projects under that group, including private projects. This represents a failure to implement proper boundary enforcement between group-level and project-level permissions.
Attack Vector
The attack requires network access and low privileges (authenticated user with group import permissions). An attacker can exploit this vulnerability by:
- Authenticating to a GitLab instance with an account that has group import permissions
- Initiating a group import operation targeting a group containing private projects
- Crafting the import payload to include label creation operations for private projects
- The system processes these operations without proper authorization validation, resulting in labels being created in private projects the attacker should not have write access to
The vulnerability is exploited through the group import functionality, where insufficient authorization validation allows the attacker to bypass project-level access controls. For detailed technical information, see the HackerOne Report #3485548 and the GitLab Work Item Details.
Detection Methods for CVE-2026-1663
Indicators of Compromise
- Unexpected labels appearing in private projects that were not created by authorized project members
- Audit logs showing label creation events during group import operations from users without project-level write access
- Group import activity from users who have not been explicitly granted access to affected private projects
Detection Strategies
- Review GitLab audit logs for group import operations and correlate with subsequent label creation events in private projects
- Monitor for users accessing the group import API endpoint who do not have explicit write access to all associated private projects
- Implement alerting on label creation events in private projects that occur during or immediately after group import operations
Monitoring Recommendations
- Enable and monitor GitLab audit logging for group import operations and label management activities
- Configure alerts for unusual patterns in label creation, particularly those occurring in bulk or associated with import operations
- Regularly audit group import permissions to ensure they are granted only to trusted users with legitimate business needs
How to Mitigate CVE-2026-1663
Immediate Actions Required
- Upgrade GitLab CE/EE to patched versions: 18.7.6, 18.8.6, or 18.9.2 depending on your current version branch
- Review and restrict group import permissions to only essential personnel pending upgrade
- Audit existing labels in private projects to identify any potentially unauthorized additions
- Review audit logs for any suspicious group import activity that may have exploited this vulnerability
Patch Information
GitLab has released patched versions addressing this vulnerability. Organizations should update to the following versions based on their deployment:
- Version 18.7.6 for users on the 18.7.x branch
- Version 18.8.6 for users on the 18.8.x branch
- Version 18.9.2 for users on the 18.9.x branch
For complete patch details, refer to the GitLab Patch Release Note.
Workarounds
- Temporarily disable or restrict access to the group import feature until patches can be applied
- Implement additional access controls at the network level to limit who can access group import functionality
- Conduct regular audits of private project labels to detect unauthorized modifications
# Check current GitLab version
gitlab-rake gitlab:env:info | grep "GitLab information"
# Update GitLab to patched version (Omnibus installation)
sudo apt-get update && sudo apt-get install gitlab-ce=18.9.2-ce.0
# Verify upgrade completed successfully
sudo gitlab-ctl reconfigure
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


