GitLab has announced a security advisory urging users to upgrade their self-managed installations right away. Versions 17.11.1, 17.10.5, and 17.9.7 are now available for both Community Edition (CE) and Enterprise Edition (EE) to fix important bugs and security issues.
High-Severity XSS and Account Takeover Risks
By infosecbulletin
/ Saturday , September 13 2025
F5 plans to acquire CalypsoAI, which offers adaptive AI security solutions. CalypsoAI's technology will be added to F5's Application Delivery...
Read More
By infosecbulletin
/ Saturday , September 13 2025
The Villager framework, an AI-powered penetration testing tool, integrates Kali Linux tools with DeepSeek AI to automate cyber attack processes....
Read More
By infosecbulletin
/ Saturday , September 13 2025
Samsung released its monthly Android security updates, addressing a vulnerability exploited in zero-day attacks. CVE-2025-21043 (CVSS score: 8.8) is a...
Read More
By infosecbulletin
/ Saturday , September 13 2025
Albania has appointed the first AI-generated government minister to help eliminate corruption. Diella, the digital assistant meaning Sun, has been...
Read More
By infosecbulletin
/ Thursday , September 11 2025
On September 1, 2025, Qrator Lab identified and managed a major attack from the largest L7 DDoS botnet seen so...
Read More
By infosecbulletin
/ Thursday , September 11 2025
A new vulnerability, CVE-2025-4235, in Palo Alto Networks’ User-ID Credential Agent for Windows, could reveal a service account's password in...
Read More
By infosecbulletin
/ Thursday , September 11 2025
CyberVolk ransomware, which appeared in May 2024, has increased attacks on government agencies and critical infrastructures in Japan, France, and...
Read More
By infosecbulletin
/ Wednesday , September 10 2025
Microsoft has issued a new warning about a critical security vulnerability in Active Directory Domain Services, known as CVE-2025-21293. An...
Read More
By infosecbulletin
/ Wednesday , September 10 2025
Sophos fixed an authentication bypass vulnerability in its AP6 Series Wireless Access Points, preventing attackers from obtaining admin privileges. The...
Read More
By infosecbulletin
/ Wednesday , September 10 2025
Security researcher Jeremiah Fowler discovered a database containing sensitive information from gym customers and staff, including names, financial details, and...
Read More
The advisory highlights several high-severity vulnerabilities, including multiple Cross-Site Scripting (XSS) issues in the Maven Dependency Proxy. These flaws may enable cross-site scripting attacks and content security policy bypass in users’ browsers under certain conditions, affecting versions from 16.6 to before 17.9.7, 17.10 to before 17.10.5, and 17.11 to before 17.11.1.
GitLab identified two XSS vulnerabilities, CVE-2025-1763 and CVE-2025-2443, both rated as high severity with a CVSS score of 8.7. These vulnerabilities were A vulnerability was discovered by joaxcar through GitLab’s HackerOne bug bounty program. It involves a Network Error Logging (NEL) Header Injection in the Maven Dependency Proxy, which risks tracking users’ browsing activities and could lead to account takeovers. This vulnerability, CVE-2025-1908, has a CVSS score of 7.7.
Denial-of-Service and Unauthorized Access:
The advisory highlights a medium-severity Denial of Service (DoS) vulnerability, CVE-2025-0639, which affects service availability during issue previews. This vulnerability impacts versions from 16.7 to before 17.9.7, 17.10 to before 17.10.5, and 17.11 to before 17.11.1, and was reported by Sigitsetiawansss.
An access control issue may allow unauthorized access to branch names when repository assets are disabled. This vulnerability, CVE-2024-12244, affects versions 17.7 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1. Mateuszek reported it via the HackerOne program.
GitLab recommends that all users upgrade to versions 17.11.1, 17.10.5, or 17.9.7 immediately to address security issues in affected versions.