CVE-2025-11702

8.5 HIGH

📋 TL;DR

This vulnerability allows authenticated GitLab users with specific permissions to hijack project runners from other projects, potentially executing unauthorized code or accessing sensitive data. It affects GitLab EE versions 17.1 through 18.3.4, 18.4 through 18.4.2, and 18.5 through 18.5.0.

💻 Affected Systems

Products:
  • GitLab Enterprise Edition
Versions: 17.1 to 18.3.4, 18.4 to 18.4.2, 18.5 to 18.5.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with specific permissions; GitLab Community Edition is not affected.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could compromise CI/CD pipelines, steal credentials, exfiltrate source code, or deploy malicious code to production environments.

🟠

Likely Case

Unauthorized access to project runners leading to data leakage, pipeline manipulation, or resource abuse.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and specific permissions; detailed technical information is available in the HackerOne report.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.3.5, 18.4.3, or 18.5.1

Vendor Advisory: https://about.gitlab.com/releases/2025/10/22/patch-release-gitlab-18-5-1-released/

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab EE 18.3.5, 18.4.3, or 18.5.1 using your preferred method (Omnibus, Helm, source). 3. Restart GitLab services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Runner Access

all

Limit project runner permissions to trusted users only and review existing assignments.

🧯 If You Can't Patch

  • Review and restrict user permissions for project runner management.
  • Implement network segmentation to isolate GitLab runners from sensitive systems.

🔍 How to Verify

Check if Vulnerable:

Check your GitLab version via the admin interface or by running 'sudo gitlab-rake gitlab:env:info' on the server.

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'GitLab version'

Verify Fix Applied:

Confirm the GitLab version is 18.3.5, 18.4.3, or 18.5.1 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized runner assignment logs
  • Suspicious API calls to runner endpoints

Network Indicators:

  • Unexpected outbound connections from runners
  • Unusual traffic patterns to/from GitLab instance

SIEM Query:

source="gitlab" AND (event="runner_assigned" OR event="runner_modified") AND user NOT IN [trusted_users]

🔗 References

📤 Share & Export