Key Takeaways
- Zoom and GitLab have released security updates to resolve multiple security vulnerabilities that could result in denial-of-service (DoS) and remote code execution.
- A critical security flaw in Zoom Node Multimedia Routers (MMRs) could permit a meeting participant to conduct remote code execution attacks, with a CVSS score of 9.9 out of 10.0.
- GitLab has released fixes for multiple high-severity flaws affecting its Community Edition (CE) and Enterprise Edition (EE) that could result in DoS and a bypass of two-factor authentication (2FA) protections.
- The vulnerabilities affect various versions of Zoom and GitLab products, and users are recommended to update to the latest available versions to safeguard against potential threats.
Introduction to Security Vulnerabilities
The recent release of security updates by Zoom and GitLab aims to address several security vulnerabilities that could have severe consequences, including denial-of-service (DoS) and remote code execution. These vulnerabilities were discovered internally by the companies’ security teams and through external researchers, highlighting the importance of continuous security testing and vulnerability detection. The most severe vulnerability affects Zoom Node Multimedia Routers (MMRs), which could allow a meeting participant to conduct remote code execution attacks. This vulnerability, tracked as CVE-2026-22844, has a CVSS score of 9.9 out of 10.0, indicating a critical severity level.
Zoom Node Multimedia Routers Vulnerability
The vulnerability in Zoom Node Multimedia Routers (MMRs) is a command injection vulnerability that could allow a meeting participant to conduct remote code execution attacks via network access. According to Zoom, the vulnerability affects the following versions: Zoom Node Meetings Hybrid (ZMH) MMR module versions prior to 5.2.1716.0 and Zoom Node Meeting Connector (MC) MMR module versions prior to 5.2.1716.0. Zoom recommends that customers using Zoom Node Meetings, Hybrid, or Meeting Connector deployments update to the latest available MMR version to safeguard against any potential threat. Fortunately, there is no evidence that the security flaw has been exploited in the wild, and users can take proactive measures to protect themselves by updating their software.
GitLab Security Flaws
In addition to the Zoom vulnerability, GitLab has released fixes for multiple high-severity flaws affecting its Community Edition (CE) and Enterprise Edition (EE). These flaws could result in DoS and a bypass of two-factor authentication (2FA) protections. The vulnerabilities are listed as follows: CVE-2025-13927, CVE-2025-13928, and CVE-2026-0723, with CVSS scores of 7.5, 7.5, and 7.4, respectively. These vulnerabilities affect various versions of GitLab, including versions from 11.9 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2. GitLab has also remediated two other medium-severity bugs, CVE-2025-13335 and CVE-2026-1102, which could trigger a DoS condition by configuring malformed Wiki documents and sending repeated malformed SSH authentication requests, respectively.
Importance of Security Updates
The release of security updates by Zoom and GitLab highlights the importance of regular software updates and vulnerability patches. These updates are crucial in protecting users against potential threats and preventing malicious actors from exploiting known vulnerabilities. Users are recommended to update their software to the latest available versions to ensure they have the latest security patches and features. Additionally, users should be aware of the potential risks associated with using outdated software and take proactive measures to protect themselves, such as implementing robust security measures, including firewalls, antivirus software, and intrusion detection systems.
Conclusion and Recommendations
In conclusion, the recent security updates released by Zoom and GitLab demonstrate the ongoing efforts to identify and address security vulnerabilities in software products. The vulnerabilities highlighted in this article, including the critical security flaw in Zoom Node Multimedia Routers (MMRs) and the high-severity flaws in GitLab, emphasize the importance of regular software updates and vulnerability patches. Users are recommended to update their software to the latest available versions and take proactive measures to protect themselves against potential threats. By staying informed about the latest security vulnerabilities and taking steps to mitigate them, users can help ensure the security and integrity of their systems and data.


