Multiple GitLab Vulnerabilities Allow Malicious Prompt Injection and Data Theft

GitLab has released critical security patches addressing nine vulnerabilities across Community Edition (CE) and Enterprise Edition (EE), including a particularly concerning prompt-injection flaw in GitLab Duo that could expose sensitive information from confidential issues.

The company is urging all self-managed installations to upgrade immediately to versions 18.5.2, 18.4.4, or 18.3.6.

The most alarming vulnerability is CVE-2025-6945, a prompt injection flaw in GitLab Duo’s review feature that allows authenticated users to leak sensitive information from confidential issues by injecting hidden prompts into merge request comments.

This attack demonstrates how AI-powered features can become significant security risks when input validation fails.

CVE IDVulnerability TitleSeverityCVSS Score
CVE-2025-11224Cross-site scripting in k8s proxyHigh7.7
CVE-2025-11865Incorrect authorization in workflowsMedium6.5
CVE-2025-2615Information disclosure in GraphQL subscriptionsMedium4.3
CVE-2025-7000Information disclosure in access controlMedium4.3
CVE-2025-6945Prompt injection in GitLab Duo reviewLow3.5
CVE-2025-6171Information disclosure in packages APILow3.1
CVE-2025-11990Client-side path traversal in branch namesLow3.1
CVE-2025-7736Improper access control in GitLab PagesLow3.1
CVE-2025-12983Denial of service in markdownLow3.1

The patch batch also includes a high-severity cross-site scripting vulnerability (CVE-2025-11224) in the Kubernetes proxy functionality, which could allow authenticated users to execute stored XSS attacks due to improper input validation.

This affects GitLab versions back to 15.10, creating a significant exposure window for organizations running older instances.

GitLab also addressed two medium-severity information disclosure issues that could grant unauthorized access to sensitive data.

CVE-2025-2615 allows blocked users to access confidential information through GraphQL WebSocket subscriptions, while CVE-2025-7000 permits unauthorized users to view confidential branch names by accessing project issues with related merge requests.

These flaws highlight critical gaps in GitLab’s access control mechanisms.

Enterprise Edition users should pay attention to CVE-2025-11865, a medium-severity authorization bypass allowing users to remove another user’s Duo workflows.

The remaining vulnerabilities include CVE-2025-6171, which enables authenticated reporters to view restricted branch names through the packages API, and CVE-2025-7736, which allows access to GitLab Pages content through OAuth provider authentication.

GitLab recommends immediate action for all affected installations. GitLab.com users are already running patched versions, and Dedicated customers require no action.

Security researchers participating in HackerOne’s bug bounty program reported most vulnerabilities, demonstrating the value of coordinated disclosure. The company also updated libxslt to version 1.1.43, patching additional security issues.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here