Security patches: Attackers can anchor malicious code on GitLab servers

The GitLab developers have closed a total of twelve security vulnerabilities. Attackers can compromise systems.

listen Print view
A symbolic update button reminds you to patch.

(Image: Photon photo/Shutterstock.com)

1 min. read

Attackers can exploit several vulnerabilities in the GitLab software development platform. The Community and Enterprise editions are affected. Security updates are available.

In a warning message, those responsible assure users that GitLab.com is already secured. They recommend that admins of on-premise instances should install the repaired versions 18.0.6, 18.1.4 or 18.2.2 as soon as possible. There is still no information whether attacks are already underway.

Four vulnerabilities (CVE-2025-7734, CVE-2025-7739, CVE-2025-6186, CVE-2025-8094) are classified as “high.” Attackers can primarily use these vulnerabilities for XSS attacks. In one case, they can even store malicious code permanently on vulnerable servers (stored XSS).

In the other cases, authentication can be bypassed (CVE-2024-10219 “medium”). In addition to closing security gaps, the developers have also fixed several bugs in the current releases.

Videos by heise

Most recently, security updates have protected GitLab against possible account takeovers.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.