Categories: Cyber Security News

Multiple GitLab Vulnerabilities Allows Attackers to achieve complete account takeover

GitLab has released critical security patches addressing multiple high-severity vulnerabilities that could enable attackers to achieve complete account takeover and compromise enterprise development environments.

The company issued versions 18.0.2, 17.11.4, and 17.10.8 for both Community Edition (CE) and Enterprise Edition (EE), urging immediate upgrades for all self-managed installations to prevent potential exploitation of these critical security vulnerabilities.

Two particularly severe vulnerabilities pose immediate threats to GitLab users. CVE-2025-4278, scoring 8.7 on the CVSS scale, represents a critical HTML injection vulnerability that could allow attackers to achieve account takeover by injecting malicious code into the search page under certain conditions.

This vulnerability affects all GitLab CE/EE versions starting with 18.0 before 18.0.2, creating a significant attack surface for organizations running recent GitLab installations.

Equally concerning is CVE-2025-2254, another high-severity cross-site scripting vulnerability with a CVSS score of 8.7.

This vulnerability enables attackers to execute malicious scripts within the snippet viewer, potentially allowing them to act in the context of legitimate users.

The vulnerability impacts a broader range of versions, affecting GitLab CE/EE installations from version 17.9 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2.

Multiple GitLab Vulnerabilities

Beyond account takeover vulnerabilities, GitLab addressed several other critical security issues that could severely impact organizational security posture.

CVE-2025-5121 specifically targets GitLab Ultimate EE customers, allowing authenticated attackers to inject malicious CI/CD jobs into all future pipelines of any project.

This vulnerability, scoring 8.5 on CVSS, affects Ultimate EE versions from 17.11 before 17.11.4 and 18.0 before 18.0.2.

Multiple denial-of-service vulnerabilities were also remediated, including CVE-2025-0673, which could trigger infinite redirect loops causing memory exhaustion.

Additional DoS vectors include unbounded webhook token names (CVE-2025-1516) and oversized board names (CVE-2025-1478), both capable of disrupting service availability.

Information disclosure vulnerabilities round out the security concerns, with CVE-2024-9512 potentially exposing private repositories during secondary node synchronization issues.

Recommended Actions

GitLab strongly recommends immediate upgrade to the latest patched versions for all affected installations.

The company emphasizes that GitLab.com is already running the patched version, while GitLab Dedicated customers require no action.

Organizations should prioritize upgrading installations running affected versions, as these vulnerabilities represent significant security risks to development infrastructure and sensitive code repositories.

All reported vulnerabilities were discovered through GitLab’s HackerOne bug bounty program, with researchers joaxcar, yvvdwf, jean_d-ou, sim4n6, pwnie, and hdtran credited for their discoveries.

GitLab maintains its standard practice of making vulnerability details public 30 days after patch release.

The company releases security fixes through both scheduled bi-monthly releases and ad-hoc critical patches for high-severity vulnerabilities.

Organizations should verify their current GitLab version and immediately schedule maintenance windows to deploy these critical security updates, as delayed patching could expose development environments to sophisticated attacks targeting source code repositories and CI/CD infrastructure.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

The post Multiple GitLab Vulnerabilities Allows Attackers to achieve complete account takeover appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

‘They Stopped Making Those Requests’ — Alice: Madness Returns Director American McGee Got Creative After EA Asked to ‘Make Things More Sexy’

Alice: Madness Returns creator and director American McGee says he "pasted dildos" on the head…

8 minutes ago

Indie Horror Games Are Invading Hollywood, and They Have the Fans to Thank For It

Watching a streamer find their way through the digital labyrinth of some spooky game—particularly one…

2 hours ago

GPT‑5.5 Bio Bug Bounty to Strengthen Advanced AI Capabilities

OpenAI has announced a new Bio Bug Bounty program for GPT-5.5 as part of its…

2 hours ago

Bucks County NAACP Hosts ‘Black History and Democracy at Risk’ Town Hall

In the wake of the 2024 presidential election, communities across the country are still reeling…

2 hours ago

Steel Ball Run Doesn’t Have A Theme Song Yet, JoJo’s Fans Made One Anyway

Though we’ve previously reported that the anime adaptation of JoJo’s Bizarre Adventure: Steel Ball Run…

3 hours ago

A Look Back, April 25

200 Years Ago John Clarke, directly opposite the Meeting House in Northampton, has on hand…

3 hours ago

This website uses cookies.