The US Cybersecurity and Infrastructure Security Agency (CISA) has recently included a vulnerability from the GitLab open source platform in its Known Exploited Vulnerabilities (KEV) catalogue. The vulnerability, labeled as CVE-2023-7028, was originally disclosed in January and affects GitLab Community and Enterprise Editions. It is an access control vulnerability that allows attackers to trigger a password reset email to an unverified email, potentially leading to account takeover. CISA has urged users to apply available patches immediately and has required US government bodies to patch the vulnerability by a certain deadline. The addition of this vulnerability to the catalogue serves as a warning to organizations about the potential impact of new vulnerabilities and the risks posed by cyber criminals. All users of affected GitLab versions should update to the latest security release and consider enabling multi-factor authentication (MFA) and rotating all stored secrets. However, it is concerning to note that despite the patch being available since January, there are still numerous vulnerable GitLab instances in various countries. This highlights the challenge of patching for many organizations, emphasizing the need to prioritize the vulnerabilities that pose the greatest risk.