Categories: Cyber Security News

GitLab Vulnerabilities Let Attackers Execute Actions by Injecting Malicious Content

GitLab has released critical security patches across multiple versions to address several high-severity vulnerabilities that could allow attackers to execute unauthorized actions through malicious content injection. 

The latest patch releases 18.1.2, 18.0.4, and 17.11.6 for both Community Edition (CE) and Enterprise Edition (EE) contain essential security fixes that require immediate attention from all self-managed GitLab administrators.

Key Takeaways
1. High-severity XSS vulnerability (CVE-2025-6948) allows attackers to execute actions via malicious content injection.
2. Authorization bypass flaws let authenticated users circumvent group-level restrictions through API manipulation.
3. Widespread impact affects GitLab versions 13.3+ through 18.1, with XSS affecting versions 17.11+.
4. Immediate patching required - upgrade to versions 18.1.2, 18.0.4, or 17.11.6 now.

Cross-Site Scripting Vulnerability (CVE-2025-6948)

The most severe vulnerability identified is CVE-2025-6948, a cross-site scripting (XSS) issue that affects both GitLab CE and EE installations. 

This high-severity vulnerability carries a CVSS score of 8.7 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), indicating significant potential impact on confidentiality and integrity.

Under certain conditions, this vulnerability could allow a successful attacker to execute actions on behalf of users by injecting malicious content. 

The attack vector requires network access with low attack complexity, requiring only low-level privileges and user interaction

However, the scope is changed, meaning the vulnerable component impacts resources beyond its security scope, potentially affecting high confidentiality and integrity.

The vulnerability impacts all versions from 17.11 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2. 

This extensive version range indicates that the vulnerability has been present in GitLab systems for a considerable period, making immediate patching crucial.

Authorization Bypass Vulnerabilities

Beyond the XSS vulnerability, GitLab has addressed multiple improper authorization issues that could allow authenticated users to bypass various security restrictions:

CVE-2025-3396 (Medium severity, CVSS 4.3) affects an extensive range of versions from 13.3 onwards, allowing authenticated project owners to bypass group-level forking restrictions through manipulated API requests. 

This vulnerability demonstrates how API manipulation can circumvent intended access controls.

Two additional low-severity vulnerabilities, CVE-2025-4972 and CVE-2025-6168 (both CVSS 2.7), specifically impact GitLab EE versions 18.0 and 18.1. 

These vulnerabilities allow authenticated users with invitation privileges and maintainers respectively to bypass group-level user invitation restrictions through crafted API requests and manipulation of group invitation functionality.

CVE Description CVSS 3.1 Score Severity
CVE-2025-6948 Cross-site scripting issue 8.7 High
CVE-2025-3396 Improper authorization issue 4.3 Medium
CVE-2025-3396 Improper authorization issue 4.3 Medium
CVE-2025-6168 Improper authorization issue 2.7 Low

The patch releases also include rsync security updates to version 3.4.1, addressing additional vulnerabilities including CVE-2024-12084 and CVE-2024-12088.

All vulnerabilities were discovered through GitLab’s HackerOne bug bounty program, highlighting the importance of responsible disclosure in identifying security flaws. 

GitLab strongly recommends that all installations running affected versions upgrade immediately to the latest patched versions. 

The comprehensive nature of these vulnerabilities, particularly the high-severity XSS issue, necessitates urgent action to prevent potential exploitation.

Investigate live malware behavior, trace every step of an attack, and make faster, smarter security decisions -> Try ANY.RUN now 

The post GitLab Vulnerabilities Let Attackers Execute Actions by Injecting Malicious Content appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

New Bills Aim to Boost Housing Supply Across Michigan

LANSING, MI (WOWO) A broad coalition of business groups, housing advocates and environmental organizations is…

30 minutes ago

Michigan Lawmakers Advance Mental Health Reform Efforts

LANSING, MI (WOWO) Michigan lawmakers are advancing a series of proposals aimed at reforming the…

30 minutes ago

Unauthorized Group Gains Access to Anthropic’s Exclusive Cyber Tool Mythos

A group of unauthorized users has reportedly breached access controls surrounding Claude Mythos Preview, Anthropic’s…

30 minutes ago

Marshall County Could Set Precedent with Data Center Ban

MARSHALL COUNTY, IND. (WOWO) Marshall County commissioners have approved a permanent ban on data centers…

40 minutes ago

Man Charged in Elkhart County Buggy Crash That Killed Two Children

ELKHART, IND. (WOWO) An Elkhart County man is facing multiple charges in connection with a…

40 minutes ago

Michael Jackson Childhood Home And Movie

Gary, Ind. (WOWO) — Interest is surging around the upcoming biographical film about Michael Jackson,…

40 minutes ago

This website uses cookies.