Saturday, May 3, 2025
HomeCVE/vulnerabilityGitLab Security Update - Patch for Multiple Vulnerabilities

GitLab Security Update – Patch for Multiple Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

GitLab, the widely adopted DevOps platform, has announced the immediate release of versions 17.8.1, 17.7.3, and 17.6.4 for both its Community Edition (CE) and Enterprise Edition (EE).

These updates address multiple security vulnerabilities and provide critical fixes, underscoring GitLab’s commitment to maintaining the highest security standards.

The vulnerabilities addressed in these updates include a high-severity Stored XSS via Asciidoctor render, a medium-severity issue where a developer could exfiltrate protected CI/CD variables via CI lint, and another medium-severity vulnerability involving cyclic references of epics leading to resource exhaustion.

- Advertisement - Google News

GitLab strongly encourages self-managed users to upgrade to the latest versions immediately to safeguard their systems.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Vulnerability Breakdown

1. Stored XSS via Asciidoctor Render – CVE-2025-0314

  • CVE-2025-0314 – Improper rendering of specific file types allowed for a cross-site scripting (XSS) attack. This issue affects all versions from 17.2 before 17.6.4, 17.7 before 17.7.3, and 17.8 before 17.8.1.

2. Developer Could Exfiltrate Protected CI/CD Variables via CI Lint – CVE-2024-11931

  • CVE-2024-11931 – Developers with specific roles could potentially exploit CI lint to access protected CI/CD variables. This issue affects versions starting from 17.0 before 17.6.4, 17.7 before 17.7.3, and 17.8 before 17.8.1.

3. Cyclic Reference of Epics Leads to Resource Exhaustion – CVE-2024-6324

  • CVE-2024-6324 – Creating cyclic references between epics could result in denial-of-service (DoS) attacks. This issue impacts versions starting from 15.7 before 17.6.4, 17.7 before 17.7.3, and 17.8 before 17.8.1.

GitLab has already deployed these updates on GitLab.com, meaning users on the hosted platform are automatically protected. GitLab Dedicated customers do not need to take action. However, self-managed GitLab users are urged to:

  1. Upgrade to one of the patched versions (17.8.1, 17.7.3, or 17.6.4) immediately.
  2. Follow best practices for securing GitLab instances, which are outlined in GitLab’s official blog.

GitLab remains steadfast in prioritizing security by addressing vulnerabilities through timely patches.

Security issues are made public 30 days after patch releases to ensure transparency while protecting vulnerabilities during the critical update window.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...

Stealthy New NodeJS Backdoor Infects Users Through CAPTCHA Verifications

Security researchers have uncovered a sophisticated malware campaign utilizing fake CAPTCHA verification screens to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...