GitLab Security Vulnerabilities: Attackers Can Intercept Credentials

The software development platform GitLab is vulnerable. Security updates close several vulnerabilities.

listen Print view
A symbolic reminder to think about updates.

(Image: AFANASEV IVAN/Shutterstock.com)

1 min. read

GitLab Community Edition and Enterprise Edition are vulnerable through several security flaws. If the prerequisites are met, attackers can gain higher user privileges. The developers assure that protected versions are already running on GitLab.com. For on-premises installations, administrators should act promptly and install the available patches.

If this is not done, attackers can exploit six security vulnerabilities, according to a warning from the GitLab developers. Two of these (CVE-2024-9183, CVE-2025-12571) are classified as "high" threat level. In the first case, attackers must already be authenticated. If so, they can, through an unspecified method, access the credentials of users with higher privileges and perform actions in their name. The second vulnerability is exploitable without authentication and leads to a DoS state. If this is not done, attackers can exploit six security vulnerabilities, according to a warning from the GitLab developers.

Videos by heise

Exploiting the remaining vulnerabilities can lead to information leaks, among other things. The developers assure that the vulnerabilities have been closed in versions 18.4.5, 18.5.3, and 18.6.1. So far, there are no reports of attackers already targeting instances.

About a month ago, the developers closed vulnerabilities in the DevSecOps platform.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.