GitLab announced the release of versions 17.9.2, 17.8.5, and 17.7.7 for both its Community Edition (CE) and Enterprise Edition (EE).
These updates include crucial bug and security fixes, urging all self-managed installations to upgrade promptly to protect against several critical vulnerabilities.
Two significant security issues identified in third-party gems used by GitLab have been highlighted:
GitLab strongly advises all affected installations to upgrade to the latest versions as soon as possible to ensure security. For those unable to upgrade immediately, several mitigation steps are recommended:
For CVE-2025-25291 & CVE-2025-25292:
For CVE-2025-27407:
Affected Product | CVEs | Severity | Mitigation Steps |
GitLab CE & EE | CVE-2025-27407 | Critical | Enable 2FA, disable SAML 2FA bypass, require admin approval for new users. |
GitLab CE & EE | CVE-2025-27407 | High | Disable Direct Transfer if enabled. |
As part of maintaining robust security standards, GitLab emphasizes the importance of regular updates and security best practices for all installations.
Users are encouraged to stay vigilant and proactive in securing their environments against evolving threats.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…
A threat actor known as #LongNight has reportedly put up for sale remote code execution…
Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…
Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…
The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…
Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…