GitLab Patches Critical Auth & DoS Bugs

GitLab Patches Critical Auth & DoS Bugs

GitLab has released important security updates for both its Community Edition (CE) and Enterprise Edition (EE) to fix several serious vulnerabilities.

The new patches — versions 18.6.1, 18.5.3, and 18.4.5 — address issues that could let attackers bypass authentication, steal user credentials, or crash servers through DoS attacks.

Admins are strongly advised to update their self-managed GitLab installations immediately. GitLab.com is already patched.

The most serious flaw, CVE-2024-9183, is a race condition in the CI/CD cache. An authenticated attacker could use this bug to steal credentials from higher-privileged users and potentially take over admin accounts or perform unauthorized actions.

CVE IDSeverityTypeDescription
CVE-2024-9183HighPrivilege EscalationA race condition in CI/CD cache allowing users to obtain higher-privileged credentials.
CVE-2025-12571HighDenial of ServiceUnauthenticated users can crash the system via malicious JSON input.
CVE-2025-12653MediumAuth BypassUnauthenticated users could join arbitrary organizations by altering headers.
CVE-2025-7449MediumDenial of ServiceAuthenticated users can cause a crash via HTTP response processing.
CVE-2025-6195MediumImproper Authorization(EE Only) Users could view restricted security reports under certain conditions.
CVE-2025-13611LowInfo DisclosureLeak of sensitive tokens in the terraform registry logs.

A key update fixes CVE-2025-12571, a serious Denial-of-Service flaw that lets anyone crash a GitLab instance using a malicious JSON request. Because no login is required, attackers could easily take repositories offline and disrupt development work.

Unauthorized Access Risk

The update fixes CVE-2025-12653, a bug that allowed users to slip past security checks and join organizations by modifying request headers.

Even though it’s less severe than the crash issue, it still poses a serious threat to privacy and access control.

GitLab urges all users to upgrade to versions 18.6.1, 18.5.3, or 18.4.5 immediately.

Single-node systems will see brief downtime during the upgrade, while multi-node setups can update with no interruption.

Staying on older versions leaves systems exposed, since attackers can now study the public patches and build exploits for outdated installations

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!