GitLab has released critical security patches addressing multiple vulnerabilities, including a high-severity cross-site scripting (XSS) vulnerability that could allow attackers to execute malicious actions on behalf of users.
The company issued versions 18.1.2, 18.0.4, and 17.11.6 for both Community Edition (CE) and Enterprise Edition (EE), urging immediate upgrades for all self-managed installations.
The most serious vulnerability, CVE-2025-6948, carries a CVSS score of 8.7 and affects all versions from 17.11 before the latest patches, potentially enabling unauthorized actions through content injection attacks.
The most critical security vulnerability, designated CVE-2025-6948, represents a cross-site scripting vulnerability that could allow successful attackers to execute actions on behalf of legitimate users by injecting malicious content into GitLab instances.
This vulnerability affects both Community and Enterprise editions across multiple version ranges, including all versions from 17.11 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2.
The vulnerability was discovered through GitLab HackerOne bug bounty program by security researcher yvvdwf.
With a CVSS score of 8.7, this represents a high-severity threat that could compromise user accounts and potentially lead to unauthorized access to sensitive repositories and data.
The attack vector operates through network access with low attack complexity, requiring only low-level privileges and user interaction, making it particularly concerning for organizations with multiple GitLab users.
Three additional vulnerabilities involve improper authorization mechanisms that could allow authenticated users to bypass various group-level restrictions:
Both lower-severity vulnerabilities involve authenticated users with elevated privileges and require high-level permissions to exploit, making them less critical but still requiring immediate patching to maintain proper access controls.
GitLab strongly recommends immediate upgrades to the latest patch versions, emphasizing that GitLab.com already runs the patched versions while GitLab Dedicated customers require no action.
The company follows a structured security release schedule, issuing patches twice monthly on the second and fourth Wednesdays, with additional ad-hoc releases for high-severity vulnerabilities.
Beyond the GitLab-specific vulnerabilities, the patches include updates to rsync version 3.4.1, addressing additional security concerns including CVE-2024-12084 and CVE-2024-12088.
The releases also incorporate numerous bug fixes across all three version branches, improving stability and functionality.
Following GitLab’s standard disclosure policy, detailed vulnerability information will be made public on their issue tracker 30 days after release.
Organizations should prioritize these updates as part of maintaining security hygiene, particularly given the high-severity nature of the primary XSS vulnerability and its potential for significant impact on user accounts and data integrity.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…