Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GitLab Patches Multiple Vulnerabilities that Allows Attackers to Trigger XSS and DoS Attack

Posted on December 11, 2025December 11, 2025 By CWS

Crucial safety patches on December 10, 2025, addressing ten important vulnerabilities throughout its Group Version and Enterprise Version platforms.

GitLab has launched up to date variations 18.6.2, 18.5.4, and 18.4.6 to handle a number of high-severity safety points.

Excessive-Severity Threats Recognized

4 vulnerabilities obtained high-severity scores and require fast remediation.

The vulnerability panorama consists of 4 high-severity flaws, 5 medium-severity points, and one low-severity vulnerability.

4 of the important points contain cross-site scripting (XSS) assaults and improper encoding that would enable unauthorized actions on behalf of different customers.

CVE IDVulnerability TypeCVSS ScoreCVE-2025-12716Cross-site Scripting (XSS)8.7CVE-2025-8405Improper Encoding / HTML Injection8.7CVE-2025-12029Cross-site Scripting (XSS)8.0CVE-2025-12562Denial of Service (DoS)7.5CVE-2025-11984Authentication Bypass6.8CVE-2025-4097Denial of Service (DoS)6.5CVE-2025-14157Denial of Service (DoS)6.5CVE-2025-11247Information Disclosure4.3CVE-2025-13978Information Disclosure4.3CVE-2025-12734HTML Injection3.5

GitLab strongly recommends all self-managed installations improve instantly, as GitLab.com already runs the patched model.

Essentially the most extreme vulnerabilities embody a cross-site scripting flaw in Wiki performance and improper encoding in vulnerability studies, each with a CVSS rating of 8.7.

Moreover, an XSS vulnerability in Swagger UI (CVSS 8.0) and a GraphQL denial-of-service challenge (CVSS 7.5) pose important dangers.

The GraphQL vulnerability significantly issues unauthenticated attackers who can craft queries bypassing complexity limits to set off service disruptions.

An authentication bypass affecting WebAuthn two-factor-authentication customers poses a medium-severity risk. Enabling authenticated attackers to bypass safety controls.

Three denial-of-service vulnerabilities goal ExifTool processing, Commit API, and GraphQL endpoints, probably disrupting service availability.

Further points embody info disclosure via error messages and HTML injection in merge request titles.

Customers operating variations earlier than 18.4.6, 18.5.x earlier than 18.5.4, or 18.6.x earlier than 18.6.2 are weak to those exploits.

The patch consists of database migrations that will affect improve timelines. Single-node situations will expertise downtime throughout migration completion.

 Correctly configured multi-node deployments can apply updates with out service interruption utilizing zero-downtime procedures.

Organizations ought to prioritize these updates as a part of common safety hygiene practices. GitLab Devoted prospects don’t require motion.

Further particulars concerning affected model ranges and particular patch notes can be found within the official GitLab launch documentation.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Attackers, DoS, GitLab, Multiple, Patches, Trigger, Vulnerabilities, XSS

Post navigation

Previous Post: High-Severity Jenkins Vulnerability Allows Unauthenticated DoS via HTTP CLI
Next Post: WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

Related Posts

Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution Cyber Security News
Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News
Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure Cyber Security News
Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups Cyber Security News
Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT Cyber Security News
Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark