<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-2995 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-2995/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-2995/feed.xml" rel="self" type="application/rss+xml"/><item><title>GitLab Improper HTML Sanitization Vulnerability (CVE-2026-2995)</title><link>https://feed.craftedsignal.io/briefs/2026-03-gitlab-cve-2026-2995/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-gitlab-cve-2026-2995/</guid><description>CVE-2026-2995 is a vulnerability in GitLab EE versions 15.4 to 18.10.1 where an authenticated user can add email addresses to other user accounts due to improper HTML sanitization, potentially leading to account takeover or information disclosure.</description><content:encoded>&lt;p>GitLab has addressed CVE-2026-2995, a vulnerability affecting GitLab Enterprise Edition. The flaw resides in versions 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1. An authenticated attacker could exploit this vulnerability to inject arbitrary HTML content into user profiles, specifically targeting the addition of unauthorized email addresses. This is due to improper sanitization of HTML within GitLab&amp;rsquo;s user profile management features. Successful exploitation can lead to…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>gitlab</category><category>html-injection</category><category>cve-2026-2995</category></item></channel></rss>