Organizations running self-managed GitLab instances must upgrade immediately to versions 18.4.2, 18.3.4, or 18.2.8 to mitigate potential service disruption.
GitLab.com has already been updated, and Dedicated customers are unaffected.
Today’s patch bundle includes fixes that strengthen GraphQL endpoint processing and tighten CI/CD job authorization checks.
The most severe issue, CVE-2025-10004, allowed unauthenticated attackers to overwhelm GitLab by submitting specially crafted GraphQL queries requesting large repository blobs, resulting in a DoS condition.
A second high-severity flaw, CVE-2025-11340, involved incorrect authorization in GraphQL mutations that could enable authenticated users with read-only tokens to perform unauthorized write operations in Enterprise Edition.
Both weaknesses have been remediated in the latest releases.
Medium-severity vulnerabilities also received attention. CVE-2025-9825 patched a missing authorization check in manual CI/CD jobs that permitted unauthorized users to view sensitive pipeline variables via the GraphQL API.
CVE-2025-2934 addressed a flaw in webhook handling where specially crafted HTTP responses could exhaust system resources and trigger service interruption.
Administrators should note that all deployment types, omnibus packages, source installations, and Helm charts are impacted unless explicitly excluded.
GitLab’s security team follows a twice-monthly scheduled release cadence on the second and fourth Wednesdays, supplemented by ad-hoc critical patches for high-severity issues.
For this update, administrators are urged to consult the GitLab releases handbook and security FAQ for detailed upgrade instructions and recommended best practices.
Upgrading promptly not only protects against the known DoS vulnerabilities but also ensures compliance with evolving security standards.
Maintaining robust security hygiene involves more than patching. GitLab recommends implementing stringent access controls, rotating personal access tokens, and leveraging network isolation techniques.
Post-upgrade, security teams should review audit logs for unusual GraphQL activity and monitor CI/CD pipelines for unauthorized access attempts.
Detailed remediation timelines and proof-of-concept code examples are published on the public issue tracker 30 days after each patch release to foster transparency and community review.
The following table summarizes the vulnerabilities addressed in this release, along with their severity ratings and CVSS 3.1 scores:
| CVE ID | Description | Severity | CVSS 3.1 Score |
|---|---|---|---|
| CVE-2025-11340 | Incorrect authorization in GraphQL mutations allows write operations | High | 7.7 |
| CVE-2025-10004 | Denial of Service via large GraphQL blob queries | High | 7.5 |
| CVE-2025-9825 | Missing authorization in manual jobs exposes CI/CD variables | Medium | 5.0 |
| CVE-2025-2934 | DoS through malicious webhook HTTP responses | Medium | 4.3 |
Regular updates to the latest patch releases remain critical in safeguarding GitLab instances from exploit attempts.
Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today
The post GitLab Releases Security Update to Patch Multiple DoS-Enabling Vulnerabilities appeared first on Cyber Security News.
Nintendo has announced a major new Switch 2 feature that improves the performance of most…
The second Magic: The Gathering set of 2026 is here, and it’s Turtle Time! The…
2024 was a solid year for Magic: The Gathering, but in all the excitement over…
Magic: The Gathering has kicked off its newest Teenage Mutant Ninja Turtles set, but Lorwyn…
Amazon has officially announced its Big Spring Sale (which is set to run this year…
Magic: The Gathering’s Universes Beyond lineup of crossovers is becoming more prevalent in 2026, but…
This website uses cookies.