Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover

Posted on June 12, 2025June 12, 2025 By CWS

A collection of essential safety vulnerabilities throughout GitLab Neighborhood Version (CE) and Enterprise Version (EE) platforms that would allow attackers to attain full account takeover and compromise complete growth infrastructures.

The corporate launched emergency patch variations 18.0.2, 17.11.4, and 17.10.8 to deal with ten distinct safety flaws, with a number of carrying high-severity CVSS scores above 8.0. 

These vulnerabilities have an effect on hundreds of thousands of GitLab installations worldwide and pose important dangers to organizations’ supply code repositories, CI/CD pipelines, and delicate growth information.

Account Takeover Vulnerabilities

Probably the most extreme vulnerability, CVE-2025-4278, presents an HTML injection flaw with a CVSS rating of 8.7 that would enable attackers to attain full account takeover by injecting malicious code into GitLab’s search performance. 

Safety researcher joaxcar found this essential flaw by GitLab’s HackerOne bug bounty program, affecting all GitLab CE/EE variations beginning with 18.0 earlier than 18.0.2.

Complementing this risk, CVE-2025-2254 represents a cross-site scripting (XSS) vulnerability with an similar CVSS rating of 8.7. 

This flaw permits attackers to execute malicious scripts throughout the snippet viewer, permitting them to impersonate legit customers and carry out unauthorized actions inside their safety context. 

The vulnerability impacts GitLab CE/EE variations from 17.9 earlier than 17.10.8, 17.11 earlier than 17.11.4, and 18.0 earlier than 18.0.2, demonstrating the widespread nature of those safety gaps.

CI/CD DoS Assaults

GitLab Final EE prospects face a further high-severity risk by CVE-2025-5121, a lacking authorization vulnerability with a CVSS rating of 8.5. 

The flaw may enable authenticated attackers to inject malicious CI/CD jobs into all future pipelines throughout any venture inside a GitLab Final occasion. 

The vulnerability impacts GitLab Final EE variations from 17.11 earlier than 17.11.4 and 18.0 earlier than 18.0.2, probably compromising complete software program growth and deployment processes.

A number of denial-of-service vulnerabilities compound these dangers, together with CVE-2025-0673 (CVSS 7.5), which permits attackers to set off infinite redirect loops, inflicting server reminiscence exhaustion. 

Extra DoS vectors embrace CVE-2025-1516 and CVE-2025-1478, exploiting unbounded webhook token names and board names, respectively, each carrying CVSS scores of 6.5. 

These vulnerabilities have an effect on GitLab installations courting again to variations 8.7 and eight.13, indicating long-standing safety weaknesses.

Quick Patching Required

GitLab strongly recommends fast upgrades to the newest patch variations for all self-managed installations, emphasizing that GitLab.com has already applied the safety fixes. 

The vulnerabilities span a number of deployment sorts, together with Omnibus, supply code installations, and Helm charts, requiring complete remediation efforts throughout numerous infrastructure configurations.

Organizations ought to prioritize upgrading affected methods instantly, as GitLab follows a accountable disclosure coverage that makes vulnerability particulars public 30 days after patch launch. 

The corporate maintains that every one customer-facing methods and information internet hosting environments should adhere to the very best safety requirements, making these patches essential for sustaining safe growth environments. 

Safety groups ought to implement these updates throughout the subsequent out there upkeep window to stop potential exploitation of those critical vulnerabilities.

Dwell Credential Theft Assault Unmask & Instantaneous Protection – Free Webinar

Cyber Security News Tags:Account, Achieve, Attackers, Complete, GitLab, Multiple, Takeover, Vulnerabilities

Post navigation

Previous Post: Don’t Click ‘Unsubscribe’ Links Blindly It May Leads to Loss of Credentials
Next Post: Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions

Related Posts

CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure Cyber Security News
Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors Cyber Security News
Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Cyber Security News
Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Cyber Security News
Securing the Cloud Best Practices for Multi-Cloud Environments Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome to Turn HTTPS on by Default for Public Sites
  • Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User
  • New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network
  • 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux
  • CISA Warns of Exploited DELMIA Factory Software Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome to Turn HTTPS on by Default for Public Sites
  • Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User
  • New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network
  • 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux
  • CISA Warns of Exploited DELMIA Factory Software Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News