GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that could allow attackers to bypass security mechanisms, execute malicious scripts, and access sensitive data.
The patches, included in versions 17.9.1, 17.8.4, and 17.7.6 for both Community Edition (CE) and Enterprise Edition (EE), mitigate critical risks affecting Kubernetes integrations, dependency management, and authorization systems.
Immediate upgrades are strongly recommended for all self-managed instances.
CVE-2025-0475: XSS in Kubernetes Proxy Endpoint (CVSS 8.7)
A high-severity cross-site scripting (XSS) vulnerability was discovered in GitLab’s Kubernetes proxy endpoint, enabling attackers to inject malicious scripts through improperly sanitized content.
Exploiting this flaw (affecting versions 15.10 to 17.9.1) could compromise user sessions or redirect traffic under specific conditions. .
CVE-2025-0555: XSS in Maven Dependency Proxy (CVSS 7.7)
Another high-severity XSS flaw in GitLab EE’s Maven Dependency Proxy allowed attackers to bypass security controls and execute arbitrary scripts in user browsers.
Impacting versions 16.6 to 17.9.1, this vulnerability underscores supply chain risks in dependency management systems.
CVE-2024-8186: HTML Injection Leading to XSS (CVSS 5.4)
A medium-severity HTML injection flaw in GitLab’s child item search feature (versions 16.6 to 17.9.1) permitted attackers to inject malicious markup, potentially leading to XSS attacks on self-hosted instances.
CVE-2024-10925: Guest User Authorization Bypass (CVSS 5.3)
This medium-severity flaw allowed Guest users in GitLab EE (versions 16.2 to 17.9.1) to read security policy YAML files containing sensitive rules and configurations.
CVE-2025-0307: Planner Role Data Exposure (CVSS 4.3)
Users with the Planner role in private GitLab EE projects (versions 17.7 to 17.9.1) could improperly access code review analytics, violating least-privilege principles.
GitLab and Dedicated instances received automatic fixes, but self-managed deployments require manual upgrades to versions 17.9.1, 17.8.4, or 17.7.6.
The company adheres to a 30-day disclosure policy, with full technical details for these CVEs slated for publication on March 27, 2025.
Administrators should:
These vulnerabilities highlight systemic risks in CI/CD platforms, particularly as attackers increasingly target:
GitLab credited researchers joaxcar, yuki_osaki, and weasterhacker through its bug bounty program, awarding payouts commensurate with the CVSS ratings.
With over 30 million users relying on GitLab, these patches are critical to maintaining trust in modern software delivery pipelines.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
Microsoft has disclosed an active exploitation of a zero-day vulnerability in the Windows Common Log…
Elastic, the company behind Kibana, has released critical security updates to address a high-severity vulnerability…
A recently discovered vulnerability in the AWS Systems Manager (SSM) Agent, a cornerstone of Amazon…
Microsoft has rolled out its April 2025 Patch Tuesday update, addressing 121 security vulnerabilities across…
In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit mobile…
A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has raised…