Categories: Cyber Security News

GitLab Releases Security Update to Patch Multiple DoS-Enabling Vulnerabilities

GitLab has released a critical security update addressing several denial-of-service (DoS) vulnerabilities in both Community Edition (CE) and Enterprise Edition (EE).

Organizations running self-managed GitLab instances must upgrade immediately to versions 18.4.2, 18.3.4, or 18.2.8 to mitigate potential service disruption.

GitLab.com has already been updated, and Dedicated customers are unaffected.

Hardened GraphQL Endpoints and CI/CD Job Authorization

Today’s patch bundle includes fixes that strengthen GraphQL endpoint processing and tighten CI/CD job authorization checks.

The most severe issue, CVE-2025-10004, allowed unauthenticated attackers to overwhelm GitLab by submitting specially crafted GraphQL queries requesting large repository blobs, resulting in a DoS condition.

A second high-severity flaw, CVE-2025-11340, involved incorrect authorization in GraphQL mutations that could enable authenticated users with read-only tokens to perform unauthorized write operations in Enterprise Edition.

Both weaknesses have been remediated in the latest releases.

Medium-severity vulnerabilities also received attention. CVE-2025-9825 patched a missing authorization check in manual CI/CD jobs that permitted unauthorized users to view sensitive pipeline variables via the GraphQL API.

CVE-2025-2934 addressed a flaw in webhook handling where specially crafted HTTP responses could exhaust system resources and trigger service interruption.

Administrators should note that all deployment types, omnibus packages, source installations, and Helm charts are impacted unless explicitly excluded.

GitLab’s security team follows a twice-monthly scheduled release cadence on the second and fourth Wednesdays, supplemented by ad-hoc critical patches for high-severity issues.

For this update, administrators are urged to consult the GitLab releases handbook and security FAQ for detailed upgrade instructions and recommended best practices.

Upgrading promptly not only protects against the known DoS vulnerabilities but also ensures compliance with evolving security standards.

Maintaining robust security hygiene involves more than patching. GitLab recommends implementing stringent access controls, rotating personal access tokens, and leveraging network isolation techniques.

Post-upgrade, security teams should review audit logs for unusual GraphQL activity and monitor CI/CD pipelines for unauthorized access attempts.

Detailed remediation timelines and proof-of-concept code examples are published on the public issue tracker 30 days after each patch release to foster transparency and community review.

CVE Details and Impact Overview

The following table summarizes the vulnerabilities addressed in this release, along with their severity ratings and CVSS 3.1 scores:

CVE ID Description Severity CVSS 3.1 Score
CVE-2025-11340 Incorrect authorization in GraphQL mutations allows write operations High 7.7
CVE-2025-10004 Denial of Service via large GraphQL blob queries High 7.5
CVE-2025-9825 Missing authorization in manual jobs exposes CI/CD variables Medium 5.0
CVE-2025-2934 DoS through malicious webhook HTTP responses Medium 4.3

Regular updates to the latest patch releases remain critical in safeguarding GitLab instances from exploit attempts.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

The post GitLab Releases Security Update to Patch Multiple DoS-Enabling Vulnerabilities appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Hackers Abuse Fake Wallpaper App and YouTube Channel to Spread notnullOSX Malware

A new macOS malware called notnullOSX has surfaced in early 2026, specifically built to steal…

39 minutes ago

Hackers Abuse Fake Wallpaper App and YouTube Channel to Spread notnullOSX Malware

A new macOS malware called notnullOSX has surfaced in early 2026, specifically built to steal…

39 minutes ago

Fake TradingView AI Agent Site is Delivering Needle Stealer Malware via Fake TradingClaw

A new malware campaign is tricking traders into downloading a data-stealing tool by impersonating the…

40 minutes ago

Fake TradingView AI Agent Site is Delivering Needle Stealer Malware via Fake TradingClaw

A new malware campaign is tricking traders into downloading a data-stealing tool by impersonating the…

40 minutes ago

Hackers Use Outlook Mailboxes to Hide Linux GoGra Backdoor Communications

A nation-state-linked hacking group has found a clever way to hide its malicious activity inside…

40 minutes ago

Township Supervisors Across Pennsylvania Urge Colleagues to Adopt Zoning for Data Centers

Upper Merion Township in the Philadelphia suburbs is no stranger to development.  During the holiday…

44 minutes ago

This website uses cookies.