Multiple GitLab Vulnerabilities Expose Users to Complete Account Takeover Risks


GitLab, the widely used DevSecOps platform, has released urgent security updates addressing multiple high-severity vulnerabilities that could allow attackers to take over user accounts, inject malicious code, and disrupt services.

The new versions—18.0.2, 17.11.4, and 17.10.8 for both Community Edition (CE) and Enterprise Edition (EE)—contain critical fixes, and administrators are strongly advised to upgrade immediately.

These updates are particularly important for organizations that manage their own GitLab instances.

– Advertisement –

GitLab.com, the hosted version, is already running the patched versions, and GitLab Dedicated customers do not need to take action.

However, self-managed installations must be upgraded to prevent exploitation of these vulnerabilities.

Technical Details of Key Vulnerabilities

The following table summarizes the most critical vulnerabilities addressed in these releases:

CVE IDVulnerability TypeImpacted VersionsSeverity (CVSS)Description
CVE-2025-4278HTML InjectionAll versions from 18.0 before 18.0.28.7Allows account takeover via malicious code injection in the search page
CVE-2025-2254Cross-Site Scripting (XSS)17.9 before 17.10.8, 17.11 before 17.11.4, 18.0 before 18.0.28.7Allows malicious script execution in the snippet viewer, enabling session hijacking
CVE-2025-5121Missing AuthorizationUltimate EE: 17.11 before 17.11.4, 18.0 before 18.0.28.5Allows injection of malicious CI/CD jobs into all future pipelines of any project
CVE-2025-0673Denial of Service (DoS)17.7 before 17.10.8, 17.11 before 17.11.4, 18.0 before 18.0.27.5Infinite redirect loop causes memory exhaustion, denying access to legitimate users
CVE-2025-1516DoS via Webhook Token Names8.7 before 17.10.8, 17.11 before 17.11.4, 18.0 before 18.0.26.5Large webhook token names cause resource exhaustion
CVE-2025-1478DoS via Board Names8.13 before 17.10.7, 17.11 before 17.11.3, 18.0 before 18.0.16.5Large board names cause resource exhaustion
CVE-2024-9512Information DisclosurePrior to 17.10.8, 17.11 before 17.11.4, 18.0 before 18.0.25.3Private repo clone possible when secondary node is out of sync
CVE-2025-5195Authorization Bypass17.9 before 17.10.7, 17.11 before 17.11.3, 18.0 before 18.0.14.3Access to arbitrary compliance frameworks beyond privileges
CVE-2025-5982IP Restriction BypassEE: 12.0 before 17.10.8, 17.11 before 17.11.4, 18.0 before 18.0.23.7Bypass group IP restrictions to view sensitive data

How Attackers Could Exploit These Flaws

The most severe vulnerability, CVE-2025-4278, allows attackers to inject malicious HTML into the GitLab search page.

Under certain conditions, this could lead to account takeover by executing arbitrary code in the context of a victim’s session.

This is especially dangerous because GitLab repositories often contain sensitive source code and configuration files, making them attractive targets for cybercriminals.

Another critical issue, CVE-2025-2254, is a cross-site scripting (XSS) vulnerability in the snippet viewer.

Attackers can inject malicious scripts that execute in the context of a legitimate user, potentially leading to session hijacking or data theft.

This vulnerability affects a wide range of GitLab versions and requires immediate patching.

For organizations using GitLab Ultimate EE, CVE-2025-5121 is particularly concerning.

An authenticated attacker can inject malicious CI/CD jobs into all future pipelines of any project. This could allow attackers to execute arbitrary code, steal sensitive data, or disrupt build and deployment processes.

The impact is limited to instances with a GitLab Ultimate license, but the potential for damage is significant.

Several Denial of Service (DoS) vulnerabilities—CVE-2025-0673, CVE-2025-1516, and CVE-2025-1478—could be exploited to exhaust server resources, causing service disruptions.

These vulnerabilities are particularly dangerous in high-availability environments where uptime is critical.

Other notable fixes include information disclosure vulnerabilities (CVE-2024-9512, CVE-2025-5195) and a group IP restriction bypass (CVE-2025-5982), which could allow unauthorized access to sensitive data.

Recommended Actions and Best Practices

GitLab strongly recommends that all affected installations be upgraded to the latest version as soon as possible.

The following technical steps are suggested:

  • Upgrade GitLab: Use the appropriate update method for your deployment (omnibus, source code, helm chart, etc.).
  • Monitor for Anomalies: Watch for unusual activity, especially in CI/CD pipelines and user sessions.
  • Review Access Controls: Ensure that only authorized users have access to sensitive repositories and CI/CD pipelines.
  • Patch Notifications: Subscribe to GitLab’s patch release notifications to stay informed about future updates.

GitLab’s DevSecOps platform is used by more than 30 million users and over half of the Fortune 100 companies.

Given its critical role in software development and deployment, prompt action is essential to protect sensitive data and maintain operational continuity.

By addressing these vulnerabilities, organizations can safeguard their development pipelines and prevent potentially catastrophic security incidents.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates



Source link