GitLab has launched emergency safety patches addressing a number of important vulnerabilities that might allow attackers to carry out account takeovers and execute saved cross-site scripting (XSS) assaults.
The patches have been launched on August 13, 2025, affecting GitLab Neighborhood Version (CE) and Enterprise Version (EE) throughout variations 18.2.2, 18.1.4, and 18.0.6.
Key Takeaways1. GitLab patched three high-severity flaws.2. Replace instantly to variations 18.0.6, 18.1.4, or 18.2.2 to forestall exploitation.3. Impacts all GitLab editions with some vulnerabilities relationship again to model 14.2.
Cross-Web site Scripting Vulnerabilities
Three high-severity XSS vulnerabilities with CVSS scores of 8.7 pose important threats to GitLab customers.
CVE-2025-6186 represents essentially the most important flaw, permitting authenticated customers to realize account takeover by injecting malicious HTML content material into work merchandise names. This vulnerability impacts GitLab CE/EE variations from 18.1 earlier than 18.1.4 and 18.2 earlier than 18.2.2.
CVE-2025-7734 impacts the blob viewer element, enabling attackers to execute actions on behalf of customers by injecting malicious content material underneath sure circumstances.
This vulnerability impacts all variations from 14.2 earlier than the patched releases. CVE-2025-7739 particularly targets scoped label descriptions, permitting authenticated customers to realize saved XSS by injecting malicious HTML content material. This flaw impacts solely GitLab model 18.2 earlier than 18.2.2.
The CVSS vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N signifies these vulnerabilities might be exploited over networks with low assault complexity, requiring solely low privileges and consumer interplay.
Permission and Authorization Vulnerabilities
CVE-2025-8094 addresses an improper dealing with of permissions challenge within the challenge API, with a CVSS rating of seven.7.
This vulnerability might permit authenticated customers with maintainer privileges to trigger denial of service to different customers’ CI/CD pipelines by manipulating shared infrastructure sources past their meant entry stage.
A number of medium-severity vulnerabilities compound the safety dangers, together with CVE-2024-12303 for incorrect privilege project in delete points operations and CVE-2024-10219 for incorrect authorization in jobs API that might permit bypassing entry controls to obtain personal artifacts.
CVETitleCVSS 3.1 ScoreSeverityCVE-2025-7734Cross-site scripting challenge in blob viewer impacts GitLab CE/EE8.7HighCVE-2025-7739Cross-site scripting challenge in labels impacts GitLab CE/EE8.7HighCVE-2025-6186Cross-site scripting challenge in Workitem impacts GitLab CE/EE8.7HighCVE-2025-8094Improper Dealing with of Permissions challenge in challenge API impacts GitLab CE/EE7.7HighCVE-2024-12303Incorrect Privilege Task challenge in delete points operation impacts GitLab CE/EE6.7MediumCVE-2025-2614Allocation of Assets With out Limits challenge in launch identify creation impacts GitLab CE/EE6.5MediumCVE-2024-10219Incorrect Authorization challenge in jobs API impacts GitLab CE/EE6.5MediumCVE-2025-8770Authorization challenge in Merge request approval coverage impacts GitLab EE6.5MediumCVE-2025-2937Inefficient Common Expression Complexity challenge in wiki impacts GitLab CE/EE6.5MediumCVE-2025-1477Allocation of Assets With out Limits challenge in Mattermost integration impacts GitLab CE/EE6.5MediumCVE-2025-5819Incorrect Permission Task challenge in ID token impacts GitLab CE/EE5.0MediumCVE-2025-2498Insufficient Entry Management challenge in IP Restriction impacts GitLab EE3.1Low
Mitigations
GitLab strongly recommends fast upgrades to the newest patched variations for all self-managed installations.
The vulnerabilities have been found by means of GitLab’s HackerOne bug bounty program by safety researchers, together with joaxcar, yvvdwf, abdelrahman_maged, and others.
GitLab.com situations are already operating patched variations, whereas GitLab Devoted prospects require no motion.
The patches embody each common migrations and post-deploy migrations which will impression improve processes, significantly for single-node situations, which is able to expertise downtime throughout upgrades.
Organizations ought to prioritize these updates as the mixture of account takeover capabilities and XSS exploitation vectors presents important safety dangers to improvement workflows and delicate code repositories.
Enhance your SOC and assist your workforce shield your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.