Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GitLab Releases Critical Security Updates to Fix Vulnerabilities

GitLab Releases Critical Security Updates to Fix Vulnerabilities

Posted on February 11, 2026 By CWS

GitLab has released essential security patches for its Community Edition (CE) and Enterprise Edition (EE) to tackle several high-severity vulnerabilities. These updates, now available in versions 18.8.4, 18.7.4, and 18.6.6, are designed to prevent potential server crashes, data theft, and user session hijacking.

Urgent Updates for GitLab Instances

Security specialists are advising administrators of self-hosted GitLab instances to apply these updates without delay, as the GitLab.com platform has already been secured. The most critical flaw, identified as CVE-2025-7659 with a CVSS score of 8.0, resides in the Web IDE. This vulnerability results from insufficient validation, allowing unauthorized access to sensitive data.

An attacker without authentication could exploit this weakness to gain access to tokens and view private repositories. This poses a significant risk to data integrity and confidentiality within affected systems.

Denial-of-Service Vulnerabilities Addressed

Additionally, the update addresses two serious Denial-of-Service (DoS) vulnerabilities. One, labeled CVE-2025-8099 (CVSS 7.5), involves service disruption via repetitive GraphQL queries. The other, CVE-2026-0958 (CVSS 7.5), allows attackers to overwhelm server resources by bypassing JSON validation processes.

These vulnerabilities could potentially render systems inoperable, emphasizing the need for immediate action to apply the patches and secure operations.

Cross-Site Scripting and Other Fixes

GitLab’s update also tackles CVE-2025-14560 (CVSS 7.3), a Cross-Site Scripting (XSS) issue within the Code Flow feature. This flaw enables malicious scripts to be injected into webpages, potentially allowing attackers to execute actions on behalf of unsuspecting users.

The update not only addresses these critical flaws but also resolves several medium-severity issues, such as Server-Side Request Forgery (SSRF) and HTML injection vulnerabilities. Administrators should be prepared for potential downtime during single-node instance upgrades due to necessary database migrations.

GitLab strongly encourages all users of affected versions to update to the latest release immediately to safeguard their environments. Keep informed by following us on Google News, LinkedIn, and X for ongoing cybersecurity updates.

Cyber Security News Tags:CVE, Cybersecurity, data protection, DoS, GitLab, Security, software patches, Update, Vulnerabilities, XSS

Post navigation

Previous Post: Critical Windows Notepad Flaw Enables Remote Code Execution
Next Post: North Korea-Linked UNC1069 Targets Crypto with AI Attacks

Related Posts

Cisco ISE Vulnerability Let Remote attacker Access Sensitive Data Cisco ISE Vulnerability Let Remote attacker Access Sensitive Data Cyber Security News
eScan Antivirus Update Server Hacked to Push Malicious Update packages eScan Antivirus Update Server Hacked to Push Malicious Update packages Cyber Security News
VirusTotal Simplifies User Options With Platform Access And New Contributor Model VirusTotal Simplifies User Options With Platform Access And New Contributor Model Cyber Security News
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands Cyber Security News
Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code Cyber Security News
New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News