Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCISA Warns of Five-Year-Old GitLab Flaw Exploited in Attacks
CISA Warns of Five-Year-Old GitLab Flaw Exploited in Attacks
Cybersecurity

CISA Warns of Five-Year-Old GitLab Flaw Exploited in Attacks

•February 4, 2026
0
BleepingComputer
BleepingComputer•Feb 4, 2026

Companies Mentioned

CISA

CISA

GitLab

GitLab

GTLB

SolarWinds

SolarWinds

SWI

Shodan

Shodan

Goldman Sachs

Goldman Sachs

Lockheed Martin

Lockheed Martin

LMT

NVIDIA

NVIDIA

NVDA

Airbus Defence and Space

Airbus Defence and Space

AIR

T-Mobile US

T-Mobile US

TMUS

Why It Matters

Exploiting the CI Lint API can compromise build pipelines and expose sensitive code, threatening both government operations and Fortune‑100 enterprises. Prompt remediation curtails a proven attack vector used by sophisticated threat actors.

Key Takeaways

  • •CVE‑2021‑39935 exploits GitLab CI Lint API.
  • •Affects GitLab versions 10.5‑14.5.2.
  • •Over 49,000 GitLab instances exposed online.
  • •CISA mandates federal patch by Feb 24 2026.
  • •Private sector urged to remediate immediately.

Pulse Analysis

The newly highlighted GitLab SSRF flaw underscores a growing risk in DevSecOps environments where continuous integration tools are trusted implicitly. Server‑side request forgery allows attackers to bypass network segmentation, reach internal services, and potentially inject malicious code into build pipelines. Because the CI Lint API validates pipeline configurations without authentication, threat actors can craft requests that trigger arbitrary network calls, turning a seemingly benign feature into a foothold for deeper intrusion. This vector is especially potent in large organizations that rely on automated CI/CD workflows, where a single compromised job can propagate across multiple projects.

CISA’s decision to place CVE‑2021‑39935 on its exploited‑in‑the‑wild list reflects a shift toward proactive federal cybersecurity governance. By issuing Binding Operational Directive 22‑01, the agency not only forces a rapid patch timeline for the Federal Civilian Executive Branch but also signals to the broader ecosystem that legacy vulnerabilities, even those patched years ago, remain dangerous if unaddressed. The directive’s three‑week deadline aligns with the agency’s broader strategy to reduce the attack surface across critical infrastructure, mirroring similar rapid‑response actions taken for the SolarWinds Web Help Desk flaw.

For private‑sector entities, the advisory serves as a reminder that compliance cannot rely solely on vendor patches; continuous asset discovery and exposure monitoring are essential. With Shodan reporting nearly 50,000 publicly reachable GitLab instances—most hosted in China—organizations must verify their inventory, enforce strict network segmentation, and consider decommissioning outdated GitLab deployments. Applying vendor‑provided mitigations, updating to GitLab 14.5.2 or later, and reviewing CI/CD security policies will help prevent attackers from leveraging this SSRF route to infiltrate development pipelines and exfiltrate intellectual property.

CISA warns of five-year-old GitLab flaw exploited in attacks

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...