SB2025102269 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)
Published: October 22, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2025-11702)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in runner API. A remote user can bypass implemented security restrictions and hijack project runners from other projects.
2) Input validation error (CVE-ID: CVE-2025-10497)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in event collection. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
3) Input validation error (CVE-ID: CVE-2025-11447)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send malicious GraphQL requests with crafted JSON payloads and perform a denial of service (DoS) attack.
4) Input validation error (CVE-ID: CVE-2025-11974)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in upload. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
5) Incorrect authorization (CVE-ID: CVE-2025-11971)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to incorrect authorization in pipeline builds. A remote user can manipulate commits and trigger unauthorized pipeline executions.
6) Business Logic Errors (CVE-ID: CVE-2025-6601)
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to a business logic error in group memberships. A remote administrator can exploit the access request approval workflow and gain unauthorized project access.
7) Missing Authorization (CVE-ID: CVE-2025-11989)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to missing authorization in quick actions. A remote user can include malicious commands in specific descriptions and execute unauthorized quick actions.
Remediation
Install update from vendor's website.