GitLab has announced a security advisory urging users to upgrade their self-managed installations right away. Versions 17.11.1, 17.10.5, and 17.9.7 are now available for both Community Edition (CE) and Enterprise Edition (EE) to fix important bugs and security issues.
High-Severity XSS and Account Takeover Risks
The advisory highlights several high-severity vulnerabilities, including multiple Cross-Site Scripting (XSS) issues in the Maven Dependency Proxy. These flaws may enable cross-site scripting attacks and content security policy bypass in users’ browsers under certain conditions, affecting versions from 16.6 to before 17.9.7, 17.10 to before 17.10.5, and 17.11 to before 17.11.1.
GitLab identified two XSS vulnerabilities, CVE-2025-1763 and CVE-2025-2443, both rated as high severity with a CVSS score of 8.7. These vulnerabilities were A vulnerability was discovered by joaxcar through GitLab’s HackerOne bug bounty program. It involves a Network Error Logging (NEL) Header Injection in the Maven Dependency Proxy, which risks tracking users’ browsing activities and could lead to account takeovers. This vulnerability, CVE-2025-1908, has a CVSS score of 7.7.
Denial-of-Service and Unauthorized Access:
The advisory highlights a medium-severity Denial of Service (DoS) vulnerability, CVE-2025-0639, which affects service availability during issue previews. This vulnerability impacts versions from 16.7 to before 17.9.7, 17.10 to before 17.10.5, and 17.11 to before 17.11.1, and was reported by Sigitsetiawansss.
An access control issue may allow unauthorized access to branch names when repository assets are disabled. This vulnerability, CVE-2024-12244, affects versions 17.7 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1. Mateuszek reported it via the HackerOne program.
GitLab recommends that all users upgrade to versions 17.11.1, 17.10.5, or 17.9.7 immediately to address security issues in affected versions.