Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation

Posted on August 14, 2025August 14, 2025 By CWS

GitLab has launched emergency safety patches addressing a number of important vulnerabilities that might allow attackers to carry out account takeovers and execute saved cross-site scripting (XSS) assaults. 

The patches have been launched on August 13, 2025, affecting GitLab Neighborhood Version (CE) and Enterprise Version (EE) throughout variations 18.2.2, 18.1.4, and 18.0.6.

Key Takeaways1. GitLab patched three high-severity flaws.2. Replace instantly to variations 18.0.6, 18.1.4, or 18.2.2 to forestall exploitation.3. Impacts all GitLab editions with some vulnerabilities relationship again to model 14.2.

Cross-Web site Scripting Vulnerabilities

Three high-severity XSS vulnerabilities with CVSS scores of 8.7 pose important threats to GitLab customers. 

CVE-2025-6186 represents essentially the most important flaw, permitting authenticated customers to realize account takeover by injecting malicious HTML content material into work merchandise names. This vulnerability impacts GitLab CE/EE variations from 18.1 earlier than 18.1.4 and 18.2 earlier than 18.2.2.

CVE-2025-7734 impacts the blob viewer element, enabling attackers to execute actions on behalf of customers by injecting malicious content material underneath sure circumstances. 

This vulnerability impacts all variations from 14.2 earlier than the patched releases. CVE-2025-7739 particularly targets scoped label descriptions, permitting authenticated customers to realize saved XSS by injecting malicious HTML content material. This flaw impacts solely GitLab model 18.2 earlier than 18.2.2.

The CVSS vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N signifies these vulnerabilities might be exploited over networks with low assault complexity, requiring solely low privileges and consumer interplay.

Permission and Authorization Vulnerabilities 

CVE-2025-8094 addresses an improper dealing with of permissions challenge within the challenge API, with a CVSS rating of seven.7. 

This vulnerability might permit authenticated customers with maintainer privileges to trigger denial of service to different customers’ CI/CD pipelines by manipulating shared infrastructure sources past their meant entry stage.

A number of medium-severity vulnerabilities compound the safety dangers, together with CVE-2024-12303 for incorrect privilege project in delete points operations and CVE-2024-10219 for incorrect authorization in jobs API that might permit bypassing entry controls to obtain personal artifacts.

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-7734Cross-site scripting challenge in blob viewer impacts GitLab CE/EE8.7HighCVE-2025-7739Cross-site scripting challenge in labels impacts GitLab CE/EE8.7HighCVE-2025-6186Cross-site scripting challenge in Workitem impacts GitLab CE/EE8.7HighCVE-2025-8094Improper Dealing with of Permissions challenge in challenge API impacts GitLab CE/EE7.7HighCVE-2024-12303Incorrect Privilege Task challenge in delete points operation impacts GitLab CE/EE6.7MediumCVE-2025-2614Allocation of Assets With out Limits challenge in launch identify creation impacts GitLab CE/EE6.5MediumCVE-2024-10219Incorrect Authorization challenge in jobs API impacts GitLab CE/EE6.5MediumCVE-2025-8770Authorization challenge in Merge request approval coverage impacts GitLab EE6.5MediumCVE-2025-2937Inefficient Common Expression Complexity challenge in wiki impacts GitLab CE/EE6.5MediumCVE-2025-1477Allocation of Assets With out Limits challenge in Mattermost integration impacts GitLab CE/EE6.5MediumCVE-2025-5819Incorrect Permission Task challenge in ID token impacts GitLab CE/EE5.0MediumCVE-2025-2498Insufficient Entry Management challenge in IP Restriction impacts GitLab EE3.1Low

Mitigations

GitLab strongly recommends fast upgrades to the newest patched variations for all self-managed installations. 

The vulnerabilities have been found by means of GitLab’s HackerOne bug bounty program by safety researchers, together with joaxcar, yvvdwf, abdelrahman_maged, and others.

GitLab.com situations are already operating patched variations, whereas GitLab Devoted prospects require no motion. 

The patches embody each common migrations and post-deploy migrations which will impression improve processes, significantly for single-node situations, which is able to expertise downtime throughout upgrades.

Organizations ought to prioritize these updates as the mixture of account takeover capabilities and XSS exploitation vectors presents important safety dangers to improvement workflows and delicate code repositories.

Enhance your SOC and assist your workforce shield your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Account, Enables, Exploitation, GitLab, Multiple, Stored, Takeover, Vulnerabilities, XSS

Post navigation

Previous Post: How to Secure Your GitHub Repositories
Next Post: GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise

Related Posts

PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
Malware Defense 101 – Identifying and Removing Modern Threats Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks
  • Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
  • Adobe’s August 2025 Patch Tuesday

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks
  • Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
  • Adobe’s August 2025 Patch Tuesday

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News