Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GitLab Releases Critical Security Updates to Fix Vulnerabilities

GitLab Releases Critical Security Updates to Fix Vulnerabilities

Posted on February 11, 2026 By CWS

GitLab has released essential security patches for its Community Edition (CE) and Enterprise Edition (EE) to tackle several high-severity vulnerabilities. These updates, now available in versions 18.8.4, 18.7.4, and 18.6.6, are designed to prevent potential server crashes, data theft, and user session hijacking.

Urgent Updates for GitLab Instances

Security specialists are advising administrators of self-hosted GitLab instances to apply these updates without delay, as the GitLab.com platform has already been secured. The most critical flaw, identified as CVE-2025-7659 with a CVSS score of 8.0, resides in the Web IDE. This vulnerability results from insufficient validation, allowing unauthorized access to sensitive data.

An attacker without authentication could exploit this weakness to gain access to tokens and view private repositories. This poses a significant risk to data integrity and confidentiality within affected systems.

Denial-of-Service Vulnerabilities Addressed

Additionally, the update addresses two serious Denial-of-Service (DoS) vulnerabilities. One, labeled CVE-2025-8099 (CVSS 7.5), involves service disruption via repetitive GraphQL queries. The other, CVE-2026-0958 (CVSS 7.5), allows attackers to overwhelm server resources by bypassing JSON validation processes.

These vulnerabilities could potentially render systems inoperable, emphasizing the need for immediate action to apply the patches and secure operations.

Cross-Site Scripting and Other Fixes

GitLab’s update also tackles CVE-2025-14560 (CVSS 7.3), a Cross-Site Scripting (XSS) issue within the Code Flow feature. This flaw enables malicious scripts to be injected into webpages, potentially allowing attackers to execute actions on behalf of unsuspecting users.

The update not only addresses these critical flaws but also resolves several medium-severity issues, such as Server-Side Request Forgery (SSRF) and HTML injection vulnerabilities. Administrators should be prepared for potential downtime during single-node instance upgrades due to necessary database migrations.

GitLab strongly encourages all users of affected versions to update to the latest release immediately to safeguard their environments. Keep informed by following us on Google News, LinkedIn, and X for ongoing cybersecurity updates.

Cyber Security News Tags:CVE, Cybersecurity, data protection, DoS, GitLab, Security, software patches, Update, Vulnerabilities, XSS

Post navigation

Previous Post: Critical Windows Notepad Flaw Enables Remote Code Execution
Next Post: North Korea-Linked UNC1069 Targets Crypto with AI Attacks

Related Posts

Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Cyber Security News
Zyxel Router Flaws: Remote Command Injection Risk Zyxel Router Flaws: Remote Command Injection Risk Cyber Security News
Multiple Vulnerabilities in Tridium Niagara Framework Multiple Vulnerabilities in Tridium Niagara Framework Cyber Security News
Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News
Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges Cyber Security News
Google Chrome 0-Day Vulnerability Actively Exploited in the Wild Google Chrome 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark