GitLab has released versions 17.9.2, 17.8.5, and 17.7.7 for its Community and Enterprise Editions to fix security vulnerabilities, including a critical authentication bypass issue.
Critical Authentication Bypass Vulnerabilities:
Two critical vulnerabilities, CVE-2025-25291 and CVE-2025-25292, are found in the ruby-saml library used by GitLab for SAML single sign-on (SSO) authentication.
The advisory states that vulnerabilities may enable an attacker with a valid signed SAML document from the Identity Provider (IdP) to impersonate another user in the SAML IdP under specific conditions.
These vulnerabilities stem from how ReXML and Nokogiri parse XML, resulting in different document structures from the same input. This inconsistency allows for Signature Wrapping attacks, which could lead to authentication bypass.
GitLab offers mitigation steps for users unable to update their instances. These steps are:
Enable two-factor authentication for all user accounts.
Disable the SAML two-factor bypass option.
Require admin approval for new user accounts.
GitLab has also patched other vulnerabilities:
CVE-2025-27407: A critical remote code execution vulnerability has been found in the Ruby GraphQL library, which could be exploited by an authenticated user through the Direct Transfer feature (disabled by default for self-managed GitLab instances) using a malicious project. Additionally, there is a medium-severity denial-of-service vulnerability (CVE-2024-13054) that could enable an attacker to trigger a system reboot under specific conditions.
Credentials Disclosure: A moderate issue (CVE-2024-12380) that may reveal sensitive authentication information from user inputs in repository mirroring settings.
A medium-severity vulnerability (CVE-2025-1257) allows an attacker to trigger a denial-of-service by manipulating certain API inputs.
Internal Notes Disclosure: A medium severity issue (CVE-2025-0652) that may allow unauthorized users to access confidential information meant for internal use only.
Shell Code Injection: A minor issue that could allow a Maintainer to add harmful code.
User Invitation Approval Bypass: A minor issue that let a user with special permission approve too many membership requests.
GitLab urges all users with affected versions to upgrade to the latest version quickly. If immediate updates aren’t possible, users should follow the provided mitigation steps.