Cyber Security News

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that could allow attackers to bypass security mechanisms, execute malicious scripts, and access sensitive data.

The patches, included in versions 17.9.1, 17.8.4, and 17.7.6 for both Community Edition (CE) and Enterprise Edition (EE), mitigate critical risks affecting Kubernetes integrations, dependency management, and authorization systems.

Immediate upgrades are strongly recommended for all self-managed instances.

Detailed Vulnerability Analysis

CVE-2025-0475: XSS in Kubernetes Proxy Endpoint (CVSS 8.7)

A high-severity cross-site scripting (XSS) vulnerability was discovered in GitLab’s Kubernetes proxy endpoint, enabling attackers to inject malicious scripts through improperly sanitized content.

Exploiting this flaw (affecting versions 15.10 to 17.9.1) could compromise user sessions or redirect traffic under specific conditions. .

CVE-2025-0555: XSS in Maven Dependency Proxy (CVSS 7.7)

Another high-severity XSS flaw in GitLab EE’s Maven Dependency Proxy allowed attackers to bypass security controls and execute arbitrary scripts in user browsers.

Impacting versions 16.6 to 17.9.1, this vulnerability underscores supply chain risks in dependency management systems.

CVE-2024-8186: HTML Injection Leading to XSS (CVSS 5.4)

A medium-severity HTML injection flaw in GitLab’s child item search feature (versions 16.6 to 17.9.1) permitted attackers to inject malicious markup, potentially leading to XSS attacks on self-hosted instances.

CVE-2024-10925: Guest User Authorization Bypass (CVSS 5.3)

This medium-severity flaw allowed Guest users in GitLab EE (versions 16.2 to 17.9.1) to read security policy YAML files containing sensitive rules and configurations.

CVE-2025-0307: Planner Role Data Exposure (CVSS 4.3)

Users with the Planner role in private GitLab EE projects (versions 17.7 to 17.9.1) could improperly access code review analytics, violating least-privilege principles.

Patch Deployment and Mitigation

GitLab and Dedicated instances received automatic fixes, but self-managed deployments require manual upgrades to versions 17.9.1, 17.8.4, or 17.7.6.

The company adheres to a 30-day disclosure policy, with full technical details for these CVEs slated for publication on March 27, 2025.

Administrators should:

  1. Prioritize upgrades for instances using Kubernetes, Maven, or granular role-based access controls.
  2. Audit user permissions to ensure compliance with least-privilege policies.
  3. Monitor proxy endpoint traffic for unusual HTML/script payloads.

These vulnerabilities highlight systemic risks in CI/CD platforms, particularly as attackers increasingly target:

  • Dependency chains: Exploits like CVE-2025-0555 show how malicious packages could infiltrate builds.
  • Overprivileged roles: Flaws like CVE-2025-0307 emphasize misconfigured permissions in complex projects.
  • Third-party integrations: Kubernetes proxy vulnerabilities (CVE-2025-0475) reveal risks in cloud-native tooling.

GitLab credited researchers joaxcar, yuki_osaki, and weasterhacker through its bug bounty program, awarding payouts commensurate with the CVSS ratings.

With over 30 million users relying on GitLab, these patches are critical to maintaining trust in modern software delivery pipelines.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…

4 minutes ago

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…

12 minutes ago

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been…

2 hours ago

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series…

3 hours ago

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…

12 hours ago

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…

12 hours ago