779
critical -5
GIT5234552111325Incident Details -
Type
Vulnerability Disclosure Patch Release
Attack Vector
Prompt Injection (CVE-2025-6945) Cross-Site Scripting (CVE-2025-11224) Improper Authorization (CVE-2025-11865) Information Disclosure (CVE-2025-2615, CVE-2025-7000, CVE-2025-6171) Improper Access Control (CVE-2025-7736) Denial of Service (CVE-2025-12983) Client-Side Path Traversal (CVE-2025-11990)
Vulnerability Exploited
CVE-2025-6945 Prompt injection in GitLab Duo review Low Allows authenticated users to leak sensitive information from confidential issues by injecting hidden prompts into merge request comments. CVE-2025-11224 Cross-site scripting in k8s proxy High Allows authenticated users to execute stored XSS attacks due to improper input validation in Kubernetes proxy functionality. CVE-2025-11865 Incorrect authorization in workflows Medium Allows users to remove another user’s Duo workflows (Enterprise Edition). CVE-2025-2615 Information disclosure in GraphQL subscriptions Medium Allows blocked users to access confidential information through GraphQL WebSocket subscriptions. CVE-2025-7000 Information disclosure in access control Medium Permits unauthorized users to view confidential branch names by accessing project issues with related merge requests. CVE-2025-6171 Information disclosure in packages API Low Enables authenticated reporters to view restricted branch names through the packages API. CVE-2025-11990 Client-side path traversal in branch names Low CVE-2025-7736 Improper access control in GitLab Pages Low Allows access to GitLab Pages content through OAuth provider authentication. CVE-2025-12983 Denial of service in markdown Low
Impact
Sensitive information from confidential issues (CVE-2025-6945) Confidential branch names (CVE-2025-7000) Restricted branch names (CVE-2025-6171) Confidential information via GraphQL (CVE-2025-2615) GitLab Community Edition (CE) GitLab Enterprise Edition (EE) GitLab Duo (AI-powered review feature) Kubernetes proxy functionality GraphQL subscriptions Packages API GitLab Pages Markdown processing Potential unauthorized access to sensitive data Risk of stored XSS attacks in Kubernetes proxy Exposure of confidential issues via AI feature exploitation Potential reputational damage due to AI-powered feature vulnerabilities Trust erosion in access control mechanisms
Response
HackerOne bug bounty program researchers Release of security patches (versions 18.5.2, 18.4.4, 18.3.6) Immediate upgrade recommendation for self-managed installations Patching prompt-injection flaw in GitLab Duo Fixing XSS vulnerability in Kubernetes proxy Addressing authorization bypass in workflows Resolving information disclosure issues in GraphQL, access control, and packages API Updating libxslt to version 1.1.43 Public security advisory Urgent upgrade notification for self-managed customers Transparency about affected versions and vulnerabilities
Data Breach
Confidential issue details Confidential branch names Restricted branch names Sensitive information accessible via GraphQL subscriptions Sensitivity Of Data: High (includes confidential project information and access-controlled data) Potential exfiltration via prompt injection (CVE-2025-6945) Unauthorized access to confidential data via multiple vectors
Lessons Learned
AI-powered features (e.g., GitLab Duo) introduce new attack surfaces requiring robust input validation. Stored XSS vulnerabilities in proxy functionalities can have broad impact across integrated systems (e.g., Kubernetes). Access control mechanisms require continuous review to prevent authorization bypasses and information disclosure. Coordinated vulnerability disclosure programs (e.g., HackerOne) are effective in identifying and mitigating security flaws. Prompt patching of third-party dependencies (e.g., libxslt) is critical to comprehensive security.
Recommendations
Immediately upgrade self-managed GitLab instances to patched versions (18.5.2, 18.4.4, or 18.3.6). Review and harden input validation for AI-powered features to prevent prompt-injection attacks. Audit Kubernetes proxy configurations to mitigate XSS risks. Enhance access control policies for GraphQL subscriptions, branch names, and workflows. Monitor for unauthorized access attempts targeting newly patched vulnerabilities. Participate in bug bounty programs to proactively identify and address security flaws. Regularly update all dependencies to their latest secure versions.
Investigation Status
Resolved (patches released)
Customer Advisories
GitLab.com users are already protected (no action required) Dedicated customers require no action Self-managed customers must upgrade immediately
Stakeholder Advisories
Urgent upgrade notification for self-managed customers Security advisory detailing vulnerabilities and mitigations
Post Incident Analysis
Insufficient input validation in GitLab Duo’s prompt handling (CVE-2025-6945). Improper sanitization in Kubernetes proxy leading to XSS (CVE-2025-11224). Flawed authorization checks in workflows and access control mechanisms (CVE-2025-11865, CVE-2025-7000, etc.). Inadequate restrictions on GraphQL subscriptions for blocked users (CVE-2025-2615). Outdated third-party library (libxslt) with known vulnerabilities. Implemented stricter input validation for AI feature prompts. Enhanced XSS protections in proxy functionalities. Strengthened authorization and access control policies. Restricted GraphQL subscription access for blocked users. Updated libxslt to version 1.1.43 to patch additional vulnerabilities. Released comprehensive security patches for all affected versions.
References