SB2025062519 - Multiple vulnerabilities in GitLab CE/EE
Published: June 25, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2025-3279)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when handling GraphQL requests. A remote user can send specially crafted GraphQL requests to the application and perform a denial of service (DoS) attack.
2) Missing authorization (CVE-ID: CVE-2025-1754)
The vulnerability allows a remote attacker to upload arbitrary files to the system.
The vulnerability exists due to missing authorization checks in the API. A remote non-authenticated attacker can upload arbitrary files to public projects by sending crafted API requests and consume all available storage, leading to a denial of service condition.
3) Improper access control (CVE-ID: CVE-2025-5315)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented UI-enforced role restriction by sending crafted API requests.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2025-2938)
The vulnerability allows a remote user to escalate privileges within the application.
The vulnerability exists due to application does not properly impose security restrictions during approval process. A remote authenticated user can gain elevated permissions within the application.
5) Improper access control (CVE-ID: CVE-2025-5846)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can assign unrelated compliance frameworks to projects by sending crafted GraphQL mutations that bypassed framework-specific permission checks.
Remediation
Install update from vendor's website.