Gitlab security vulnerabilities: downgraded admins retain far-reaching rights

Several vulnerabilities threaten the Gitlab software development platform. Versions equipped against possible attacks are available for download.

listen Print view

(Image: Alfa Photo/Shutterstock.com)

1 min. read

Attackers can exploit seven vulnerabilities in Gitlab Community Edition and Enterprise Edition. According to the provider, secure editions are already running on Gitlab.com. So far, there are no reports of ongoing attacks. However, admins should not wait too long to install the security patches.

In a warning message, the developers write that three vulnerabilities (CVE-2025-2255, CVE-2025-0811, CVE-2025-2242) are classified with a"high" threat level. In the first two cases, XSS attacks are possible and attackers can execute their own code. It is not clear from the description whether these are persistent XSS vulnerabilities.

Videos by heise

The third of these vulnerabilities is a security problem in the assignment of rights. If an admin is downgraded to a normal user, their admin rights are retained. By successfully exploiting the remaining gaps, attackers can view data without authorization.

The developers assure us that they have closed the gaps in versions 17.8.6, 17.9.3 and 17.10.1.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.