GitLab has launched essential safety patches addressing a number of vulnerabilities throughout its Group Version (CE) and Enterprise Version (EE) platforms, with variations 18.2.1, 18.1.3, and 18.0.5 now out there for rapid deployment.
The discharge contains fixes for six distinct safety vulnerabilities, together with two high-severity cross-site scripting (XSS) points that pose important dangers to Kubernetes proxy performance.
Key Takeaways1. GitLab mounted 6 vulnerabilities together with 2 high-severity XSS flaws in newest variations.2. Essential XSS vulnerabilities goal Kubernetes proxy (CVSS 8.7-7.7).3. Self-managed installations should improve instantly.
These patches symbolize a coordinated response to vulnerabilities found by GitLab’s HackerOne bug bounty program, with rapid motion strongly really helpful for all self-managed installations.
Kubernetes Proxy Vulnerabilities
Probably the most extreme vulnerabilities addressed on this patch cycle contain cross-site scripting assaults focusing on GitLab‘s Kubernetes proxy performance.
CVE-2025-4700, rated with a CVSS rating of 8.7, impacts the Kubernetes proxy characteristic and will doubtlessly enable authenticated attackers to set off unintended content material rendering, resulting in XSS underneath particular circumstances.
The vulnerability impacts all GitLab CE/EE variations from 15.10 earlier than the present patches.
Moreover, CVE-2025-4439 addresses a associated XSS subject particularly affecting situations served by content material supply networks (CDNs), carrying a CVSS rating of seven.7.
Each vulnerabilities had been found by safety researcher joaxcar by the HackerOne platform, highlighting the effectiveness of GitLab’s bug bounty program in figuring out essential safety flaws.
Info Disclosure and Entry Management Points
4 medium-severity vulnerabilities full the safety patch roster, every carrying CVSS scores of 4.3.
CVE-2025-7001 addresses an publicity of delicate data subject affecting resource_group API entry, whereas CVE-2025-4976 particularly impacts GitLab Enterprise Version customers by fixing improper entry management to inside notes in GitLab Duo responses.
The remaining vulnerabilities, CVE-2025-0765 and CVE-2025-1299, handle unauthorized entry to customized service desk electronic mail addresses and deployment job logs, respectively.
These vulnerabilities collectively reveal the excellent safety assessment undertaken by GitLab’s safety group, with researchers iamgk808, rogerace, and pwnie contributing to the invention course of by accountable disclosure.
CVETitleCVSS 3.1 ScoreSeverityCVE-2025-4700Cross-site scripting subject impacts Kubernetes Proxy in GitLab CE/EE8.7HighCVE-2025-4439Cross-site scripting subject impacts Kubernetes Proxy in GitLab CE/EE utilizing CDNs7.7HighCVE-2025-7001Exposure of Delicate Info to an Unauthorized Actor subject impacts GitLab CE/EE4.3MediumCVE-2025-4976Improper Entry Management subject impacts GitLab EE4.3MediumCVE-2025-0765Exposure of Delicate Info to an Unauthorized Actor subject impacts GitLab CE/EE4.3MediumCVE-2025-1299Improper Entry Management subject impacts GitLab CE/EE4.3Medium
GitLab strongly recommends rapid upgrading to the newest patch variations, emphasizing that GitLab.com is already working the patched variations, whereas GitLab Devoted clients require no motion.
The corporate maintains a bi-monthly scheduled launch cycle on the second and fourth Wednesdays, with extra ad-hoc essential patches for high-severity vulnerabilities as demonstrated by this launch.
Safety vulnerability particulars will probably be publicly disclosed on GitLab’s subject tracker 30 days post-release, sustaining transparency whereas permitting sufficient time for system directors to implement crucial patches.
Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now