Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-j2jr-e1am-tfed
SummaryGitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper sanitization of HTML content.
Aliases
0
alias CVE-2026-2995
Fixed_packages
0
url pkg:deb/debian/gitlab@0?distro=sid
purl pkg:deb/debian/gitlab@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@0%3Fdistro=sid
1
url pkg:deb/debian/gitlab@17.6.5-19?distro=sid
purl pkg:deb/debian/gitlab@17.6.5-19?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@17.6.5-19%3Fdistro=sid
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2995
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19971
published_at 2026-04-02T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19796
published_at 2026-04-13T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19768
published_at 2026-04-16T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19771
published_at 2026-04-18T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19783
published_at 2026-04-21T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19678
published_at 2026-04-24T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20029
published_at 2026-04-04T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19756
published_at 2026-04-07T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19836
published_at 2026-04-08T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19889
published_at 2026-04-09T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19897
published_at 2026-04-11T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19853
published_at 2026-04-12T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22024
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2995
1
reference_url https://hackerone.com/reports/3564600
reference_id 3564600
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-26T03:55:35Z/
url https://hackerone.com/reports/3564600
2
reference_url https://gitlab.com/gitlab-org/gitlab/-/work_items/591065
reference_id 591065
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-26T03:55:35Z/
url https://gitlab.com/gitlab-org/gitlab/-/work_items/591065
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
4
reference_url https://about.gitlab.com/releases/2026/03/25/patch-release-gitlab-18-10-1-released/
reference_id patch-release-gitlab-18-10-1-released
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-26T03:55:35Z/
url https://about.gitlab.com/releases/2026/03/25/patch-release-gitlab-18-10-1-released/
Weaknesses
0
cwe_id 80
name Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
description The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as <, >, and & that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Exploits
Severity_range_score7.7 - 7.7
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-j2jr-e1am-tfed