CVE-2025-0194

6.5 MEDIUM

📋 TL;DR

This vulnerability in GitLab CE/EE could expose access tokens in application logs under specific API request conditions. Attackers who gain access to logs could steal tokens and impersonate users. All GitLab instances running affected versions are potentially vulnerable.

💻 Affected Systems

Products:
  • GitLab Community Edition
  • GitLab Enterprise Edition
Versions: 17.4 to 17.5.4, 17.6 to 17.6.2, 17.7 to 17.7.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances where specific API requests trigger the logging behavior. Self-managed and GitLab.com SaaS are both affected.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative access tokens from logs, leading to complete compromise of the GitLab instance, data exfiltration, and lateral movement within the environment.

🟠

Likely Case

Unauthorized users discover exposed tokens in logs and use them to access repositories, pipelines, or other resources at the token's permission level.

🟢

If Mitigated

With proper log access controls and monitoring, token exposure is detected quickly and tokens are revoked before exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to GitLab logs and specific API request patterns to trigger token logging.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.5.5, 17.6.3, or 17.7.1

Vendor Advisory: https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/#possible-access-token-exposure-in-gitlab-logs

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to patched version using your package manager (apt/yum). 3. Run 'gitlab-ctl reconfigure'. 4. Restart GitLab services.

🔧 Temporary Workarounds

Restrict Log Access

linux

Limit access to GitLab log files to authorized administrators only.

chmod 600 /var/log/gitlab/*.log
chown git:git /var/log/gitlab/*.log

Rotate Access Tokens

all

Revoke and regenerate all access tokens to invalidate any potentially exposed tokens.

🧯 If You Can't Patch

  • Implement strict access controls on GitLab log directories and files
  • Enable comprehensive logging monitoring and alerting for suspicious access patterns

🔍 How to Verify

Check if Vulnerable:

Check GitLab version with 'sudo gitlab-rake gitlab:env:info' and compare against affected ranges.

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'GitLab Version'

Verify Fix Applied:

Confirm version is 17.5.5, 17.6.3, or 17.7.1 using 'sudo gitlab-rake gitlab:env:info'.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected access to GitLab log files
  • Log entries containing access token patterns
  • API requests matching the specific triggering pattern

Network Indicators:

  • Unusual API token usage from new locations
  • Increased failed authentication attempts followed by successful token-based access

SIEM Query:

source="/var/log/gitlab/*.log" AND "access_token"

🔗 References

📤 Share & Export