Thursday, February 27, 2025
HomeCVE/vulnerabilityGitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

Published on

SIEM as a Service

Follow Us on Google News

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that could allow attackers to bypass security mechanisms, execute malicious scripts, and access sensitive data.

The patches, included in versions 17.9.1, 17.8.4, and 17.7.6 for both Community Edition (CE) and Enterprise Edition (EE), mitigate critical risks affecting Kubernetes integrations, dependency management, and authorization systems.

Immediate upgrades are strongly recommended for all self-managed instances.

Detailed Vulnerability Analysis

CVE-2025-0475: XSS in Kubernetes Proxy Endpoint (CVSS 8.7)

A high-severity cross-site scripting (XSS) vulnerability was discovered in GitLab’s Kubernetes proxy endpoint, enabling attackers to inject malicious scripts through improperly sanitized content.

Exploiting this flaw (affecting versions 15.10 to 17.9.1) could compromise user sessions or redirect traffic under specific conditions. .

CVE-2025-0555: XSS in Maven Dependency Proxy (CVSS 7.7)

Another high-severity XSS flaw in GitLab EE’s Maven Dependency Proxy allowed attackers to bypass security controls and execute arbitrary scripts in user browsers.

Impacting versions 16.6 to 17.9.1, this vulnerability underscores supply chain risks in dependency management systems.

CVE-2024-8186: HTML Injection Leading to XSS (CVSS 5.4)

A medium-severity HTML injection flaw in GitLab’s child item search feature (versions 16.6 to 17.9.1) permitted attackers to inject malicious markup, potentially leading to XSS attacks on self-hosted instances.

CVE-2024-10925: Guest User Authorization Bypass (CVSS 5.3)

This medium-severity flaw allowed Guest users in GitLab EE (versions 16.2 to 17.9.1) to read security policy YAML files containing sensitive rules and configurations.

CVE-2025-0307: Planner Role Data Exposure (CVSS 4.3)

Users with the Planner role in private GitLab EE projects (versions 17.7 to 17.9.1) could improperly access code review analytics, violating least-privilege principles.

Patch Deployment and Mitigation

GitLab and Dedicated instances received automatic fixes, but self-managed deployments require manual upgrades to versions 17.9.1, 17.8.4, or 17.7.6.

The company adheres to a 30-day disclosure policy, with full technical details for these CVEs slated for publication on March 27, 2025.

Administrators should:

  1. Prioritize upgrades for instances using Kubernetes, Maven, or granular role-based access controls.
  2. Audit user permissions to ensure compliance with least-privilege policies.
  3. Monitor proxy endpoint traffic for unusual HTML/script payloads.

These vulnerabilities highlight systemic risks in CI/CD platforms, particularly as attackers increasingly target:

  • Dependency chains: Exploits like CVE-2025-0555 show how malicious packages could infiltrate builds.
  • Overprivileged roles: Flaws like CVE-2025-0307 emphasize misconfigured permissions in complex projects.
  • Third-party integrations: Kubernetes proxy vulnerabilities (CVE-2025-0475) reveal risks in cloud-native tooling.

GitLab credited researchers joaxcar, yuki_osaki, and weasterhacker through its bug bounty program, awarding payouts commensurate with the CVSS ratings.

With over 30 million users relying on GitLab, these patches are critical to maintaining trust in modern software delivery pipelines.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...