{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2025-020.pdf"
    },
    "title": "High Severity Vulnerabilities in Gitlab Products",
    "serial_number": "2025-020",
    "publish_date": "12-06-2025 16:34:25",
    "description": "On 11 June 2025, Gitlab released security updates for their products addressing multiple vulnerabilities in Gitlab Community Edition (CE) and Enterprise Edition (EE).<br>\nIt is recommended updating affected Gitlab installations as soon as possible.<br>\n",
    "url_title": "2025-020",
    "content_markdown": "---    \ntitle: 'High Severity Vulnerabilities in\u00a0Gitlab\u00a0Products'\nnumber: '2025-020'\nversion: '1.0'\noriginal_date: '2025-06-12'\ndate: '2025-06-12'\n---\n\n_History:_\n\n* _12/06/2025 --- v1.0 -- Initial publication_\n\n# Summary \n\nOn 11 June 2025, Gitlab released security updates for their products addressing multiple vulnerabilities in Gitlab Community Edition (CE) and Enterprise Edition (EE) [1].\n\nIt is recommended updating affected Gitlab installations as soon as possible.\n\n# Technical Details\n\nThe vulnerability **CVE-2025-4278**, with a CVSS score of 8.7, is an issue that, under certain conditions, could have allowed a successful attacker to achieve account takeover by injecting code into the search page.\n\nThe vulnerability **CVE-2025-2254**, with a CVSS score of 8.7, is a cross-site scripting (XSS) issue that, under certain conditions, could have allowed a successful attacker to act in the context of a legitimate user by injecting a malicious script into the snippet viewer.\n\nThe vulnerability **CVE-2025-5121**, with a CVSS score of 8.5, is a missing authorisation vulnerability  that, under certain conditions, could have allowed a successful attacker with authenticated access to a GitLab instance with a GitLab Ultimate license applied (paid customer or trial) to inject a malicious CI/CD job into all future CI/CD pipelines of any project.\n\nThe vulnerability **CVE-2025-0673**, with a CVSS score of 7.5, is an issue that could have allowed a successful attacker to deny access to legitimate users of the targeted system by triggering an infinite redirect loop causing memory exhaustion on the server.\n\nGitlab also fixes 5 medium and 1 low severity vulnerabilities.\n\n# Affected Products\n\nThe following products and versions are affected by one or more high severity vulnerabilities [1]:\n\n- GitLab CE/EE: all versions from 7.7 before 17.10.8, 17.9 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2\n- GitLab Ultimate EE from 17.11 before 17.11.4 and 18.0 before 18.0.2\n\n# Recommendations\n\nIt is recommended updating affected Gitlab installations as soon as possible.\n\n# References\n\n[1] <https://about.gitlab.com/releases/2025/06/11/patch-release-gitlab-18-0-2-released/> ",
    "content_html": "<p><em>History:</em></p><ul><li><em>12/06/2025 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On 11 June 2025, Gitlab released security updates for their products addressing multiple vulnerabilities in Gitlab Community Edition (CE) and Enterprise Edition (EE) [1].</p><p>It is recommended updating affected Gitlab installations as soon as possible.</p><h2 id=\"technical-details\">Technical Details</h2><p>The vulnerability <strong>CVE-2025-4278</strong>, with a CVSS score of 8.7, is an issue that, under certain conditions, could have allowed a successful attacker to achieve account takeover by injecting code into the search page.</p><p>The vulnerability <strong>CVE-2025-2254</strong>, with a CVSS score of 8.7, is a cross-site scripting (XSS) issue that, under certain conditions, could have allowed a successful attacker to act in the context of a legitimate user by injecting a malicious script into the snippet viewer.</p><p>The vulnerability <strong>CVE-2025-5121</strong>, with a CVSS score of 8.5, is a missing authorisation vulnerability that, under certain conditions, could have allowed a successful attacker with authenticated access to a GitLab instance with a GitLab Ultimate license applied (paid customer or trial) to inject a malicious CI/CD job into all future CI/CD pipelines of any project.</p><p>The vulnerability <strong>CVE-2025-0673</strong>, with a CVSS score of 7.5, is an issue that could have allowed a successful attacker to deny access to legitimate users of the targeted system by triggering an infinite redirect loop causing memory exhaustion on the server.</p><p>Gitlab also fixes 5 medium and 1 low severity vulnerabilities.</p><h2 id=\"affected-products\">Affected Products</h2><p>The following products and versions are affected by one or more high severity vulnerabilities [1]:</p><ul><li>GitLab CE/EE: all versions from 7.7 before 17.10.8, 17.9 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2</li><li>GitLab Ultimate EE from 17.11 before 17.11.4 and 18.0 before 18.0.2</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>It is recommended updating affected Gitlab installations as soon as possible.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://about.gitlab.com/releases/2025/06/11/patch-release-gitlab-18-0-2-released/\">https://about.gitlab.com/releases/2025/06/11/patch-release-gitlab-18-0-2-released/</a> </p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}