Multiple GitLab Vulnerabilities Allow Attackers to Trigger Denial-of-Service Attacks

GitLab has released patch updates for both Community Edition (CE) and Enterprise Edition (EE) to address several denial-of-service (DoS) issues and other flaws.

Versions 18.5.1, 18.4.3, and 18.3.5 include critical security fixes. All self-managed installations should upgrade immediately.

GitLab.com already runs the patched version, and GitLab Dedicated customers do not need to take action.

Scheduled and Ad-Hoc Patch Releases

GitLab follows a regular schedule for patch releases on the second and fourth Wednesdays of each month.

In addition, ad-hoc critical patches may be issued for high-severity vulnerabilities. The latest updates include fixes for improper access control in the runner API, DoS in event collection, JSON validation, and upload endpoints.

For more details on release processes and security practices, refer to the GitLab releases handbook and security FAQ.

Several vulnerabilities could allow an attacker to disrupt service without authentication. DoS conditions arise when specially crafted payloads overload APIs or validation routines.

In the event of collection and JSON validation issues, unauthenticated users can trigger high-resource usage.

Upload endpoints also accept large files that exhaust server capacity when misused. These risks underscore the need for timely patching to maintain availability for all users.

Beyond DoS, an improper access control bug in the runner API could let an authenticated user hijack project runners across groups.

Incorrect authorization in pipeline builds might allow unauthorized job executions by altering commits.

Business logic errors in group memberships and missing authorization in quick actions create further attack paths. All of these issues are addressed in the latest patch releases.

All installations running affected versions should upgrade to the latest available release as soon as possible.

No downtime is required for multi-node deployments. Omnibus packages will run migrations automatically, but can be configured for zero downtime by adding a skip-auto-reconfigure file.

Table of Security Fixes

CVEDescriptionSeverityAffected VersionsCVSS Score
CVE-2025-11702Improper access control in runner API impacts GitLab EEHighEE 17.1–18.3.5, 18.4–18.4.3, 18.5–18.5.18.5
CVE-2025-10497Denial of service in event collection impacts GitLab CE/EEHighCE/EE 17.10–18.3.5, 18.4–18.4.3, 18.5–18.5.17.5
CVE-2025-11447Denial of service in JSON validation impacts GitLab CE/EEHighCE/EE 11.0–18.3.5, 18.4–18.4.3, 18.5–18.5.17.5
CVE-2025-11974Denial of service in upload impacts GitLab CE/EEMediumCE/EE 11.7–18.3.5, 18.4–18.4.3, 18.5–18.5.16.5
CVE-2025-11971Incorrect authorization in pipeline builds impacts GitLab CEMediumCE 10.6–18.3.5, 18.4–18.4.3, 18.5–18.5.16.5
CVE-2025-6601Business logic error in group memberships impacts GitLab EELowEE 18.4–18.3.5, 18.4–18.4.3, 18.5–18.5.13.8
CVE-2025-11989Missing authorization in quick actions impacts GitLab EELowEE 17.6–18.3.5, 18.4–18.4.3, 18.5–18.5.13.7

By upgrading to GitLab 18.5.1, 18.4.3, or 18.3.5, self-managed installations will protect against these vulnerabilities and maintain the highest security standards.

Continuous patching and adherence to best practices are vital to secure your GitLab instance and safeguard your project data.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

The post Multiple GitLab Vulnerabilities Allow Attackers to Trigger Denial-of-Service Attacks appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading