GitLab Issues Urgent Patch to Fix High-Severity Vulnerabilities

Published:

spot_img

GitLab Releases Critical Patch Updates for Enhanced Security and Stability

GitLab has rolled out significant updates through its latest patch release aimed at fixing various security vulnerabilities and enhancing overall stability. The updates, identified as versions 18.8.2, 18.7.2, and 18.6.4, are applicable to both the GitLab Community Edition and the Enterprise Edition for self-managed installations. Administrators using these versions are strongly encouraged to upgrade promptly to ensure their systems are secure.

Details of the Patch Release

The recently issued patch notes highlight critical fixes related to security risks that impact a range of GitLab editions. GitLab.com is already utilizing these patched versions, which means customers using GitLab Dedicated won’t need to take any action. However, organizations managing their own GitLab instances should prioritize these upgrades to protect against known vulnerabilities.

Significant Vulnerabilities Addressed

Among the vulnerabilities addressed is CVE-2025-13927, which presents a denial of service risk in the Jira Connect integration. This vulnerability allows unauthenticated attackers to generate a denial-of-service situation by sending carefully crafted requests containing incorrect authentication data. It affects GitLab Community and Enterprise Editions from versions 11.9 to just below the patched versions. This issue has been rated with a CVSS score of 7.5, indicating a notable level of severity, and was reported via GitLab’s HackerOne bug bounty program.

Another critical issue, CVE-2025-13928, pertains to the Releases API where inadequate authorization validation creates a similar denial-of-service vulnerability. Affecting versions 17.7 and earlier, this vulnerability, too, scores 7.5 on the CVSS scale and was also reported by the same researcher.

Additionally, GitLab addressed a vulnerability coded as CVE-2026-0723. This flaw in the authentication service allows an attacker with knowledge of a victim’s credential ID to bypass two-factor authentication by submitting fabricated device responses. This issue affects versions before the newly patched releases and has a CVSS score of 7.4. The vulnerability was flagged by another security researcher active on HackerOne.

Medium-Severity Issues and Fixes

Several medium-severity issues have also been addressed in this update. One standout problem is CVE-2025-13335, which involves the potential for an infinite loop in Wiki redirects. This could permit authenticated users to create denial of service conditions by manipulating Wiki documents, affecting versions from 17.1 onward, with a CVSS score of 6.5. Another notable fix is for CVE-2026-1102, a denial-of-service vulnerability triggered by repetitive improper SSH authentication requests, impacting versions from 12.3 onward and carrying a CVSS score of 5.3. This vulnerability was internally discovered by a GitLab employee.

Comprehensive Bug Fixes and Upgrade Advice

Beyond addressing security vulnerabilities, the latest patch comes with numerous bug fixes for the affected versions. These include solutions for issues such as crashes related to merge request reviewers, race conditions in searchable dropdowns, and SSH-related errors in self-managed environments. Moreover, improvements have been made to Continuous Integration (CI) jobs, Sidekiq worker performance, and overall platform operations.

GitLab has noted that this patch also entails database migrations that may influence installation and upgrade processes. For single-node installations, there will be downtime while these migrations are applied before the service can resume. Conversely, organizations with multi-node setups can follow zero-downtime upgrade protocols to implement the latest updates without interruptions.

All users operating versions that are susceptible to these vulnerabilities are encouraged to upgrade to the latest patch release posthaste. This proactive measure will help mitigate risks associated with the identified vulnerabilities and fortify platform stability, ensuring a secure and reliable development environment.

spot_img

Related articles

Recent articles

Cyber Express Weekly: FortiOS Exploits, Ransomware Threats, Hacktivist Activity, and EU Telecom Updates

Understanding the Cybersecurity Landscape: Insights from Week Three of 2026 In the ever-evolving realm of cybersecurity, the third week of 2026 serves as a crucial...

VFS Global Unveils Modern Visa Service Center for Czech Republic and Germany in Kuwait

New Visa Application Center Opens in Kuwait A Modern Visa Application Experience VFS Global, recognized as a leader in secure technology services, has officially opened a...

Phishing Kits Team Up with Phone Scammers to Bypass Multifactor Authentication

New Phishing Toolkits Targeting Voice Communication Understanding the Shift in Phishing Techniques Recent research has unveiled a new trend in phishing tactics that utilize voice communication—often...

Health Data Breach Raises Alarm Over Impersonation and Phishing Risks

## Ongoing Concerns Following Manage My Health Data Breach The recent data breach involving Manage My Health, a popular digital health platform in New Zealand,...