Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks

Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks

Posted on May 22, 2025May 23, 2025 By CWS

GitLab has launched essential safety patches addressing 11 vulnerabilities throughout its Neighborhood Version (CE) and Enterprise Version (EE) platforms, with a number of high-risk flaws enabling denial-of-service (DoS) assaults. 

The coordinated launch of variations 18.0.1, 17.11.3, and 17.10.7 comes because the DevOps platform confronts a number of assault vectors that might destabilize methods by means of useful resource exhaustion, authentication bypasses, and information publicity dangers.

This safety replace represents GitLab’s most complete remediation effort in 2025, impacting all deployment fashions together with omnibus, supply code, and helm chart installations. 

The corporate strongly recommends that every one self-managed GitLab installations be upgraded instantly, whereas noting that GitLab.com is already operating the patched model.

Vital Massive Blob Endpoint Vulnerability 

Probably the most extreme vulnerability (CVE-2025-0993) allows authenticated attackers to set off server useful resource exhaustion by means of an unprotected massive blob endpoint, scoring 7.5 on the CVSS v3.1 scale. 

This high-severity flaw impacts all installations previous to the patched variations, permitting risk actors to overwhelm methods by repeatedly submitting outsized information payloads.

A Git blob (binary massive object) is the item sort used to retailer the contents of every file in a repository. 

The vulnerability seems to use GitLab’s dealing with of those blobs, which for sizes bigger than 10 MB have already got a charge restrict of 5 requests per minute. 

The safety crew confirmed this vulnerability might maintain extended downtime in unprotected environments.

Medium-Severity DoS Assault Vectors Patched

A number of extra medium-severity DoS vectors had been recognized and addressed on this launch:

CVE-2025-3111 (CVSS 6.5): Unbounded Kubernetes cluster tokens might result in DoS. An absence of enter validation within the Kubernetes integration permits authenticated customers to trigger a denial of service by producing extreme tokens.

CVE-2025-2853 (CVSS 6.5): Unvalidated notes place could result in Denial of Service. An absence of correct validation in GitLab might enable an authenticated person to set off a DoS situation.

CVE-2024-7803 (CVSS 6.5): A Discord webhook integration could trigger DoS. This vulnerability impacts all variations from 11.6 earlier than the patched releases.

Earlier analysis has proven that webhook performance in GitLab might be abused for DoS assaults. 

As famous in a single bug report: “Since there is no such thing as a charge restrict on the gitlab.com webhook perform, attackers can use this to ship a number of requests to the victims server”.

GitLab urges directors to take rapid motion:

Improve instantly: “We strongly advocate that every one installations operating a model affected by the problems described are upgraded to the most recent model as quickly as potential”.

Apply correct enter validation: Most of the vulnerabilities stem from insufficient validation of person inputs, significantly for blobs, notes positions, and Kubernetes tokens.

Monitor system sources: Throughout potential assaults, monitoring CPU and reminiscence utilization might help establish exploitation makes an attempt. 

Instructions like htop for normal system reminiscence utilization and dmesg -T -w for kernel logs might be helpful diagnostic instruments.

Contemplate object storage configuration: For big situations, configuring correct object storage with acceptable limits might help mitigate blob-related assaults.

These vulnerabilities collectively exhibit the continuing challenges in securing advanced DevOps platforms in opposition to useful resource exhaustion assaults, significantly when dealing with massive binary objects and exterior integrations.

Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, & X to Get Immediate Updates!

Cyber Security News Tags:Attackers, Attacks, DoS, GitLab, Multiple, Trigger, Vulnerabilities

Post navigation

Previous Post: Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
Next Post: INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia

Related Posts

Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats Cyber Security News
Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091 Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091 Cyber Security News
New ClickFix Attacks Use Windows Terminal for Malware New ClickFix Attacks Use Windows Terminal for Malware Cyber Security News
System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies Cyber Security News
Critical Vulnerability in Python PLY Library Enables Remote Code Execution Critical Vulnerability in Python PLY Library Enables Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark