CVE-2025-13772

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated GitLab users to access and use AI model settings from namespaces they shouldn't have access to by manipulating namespace identifiers in API requests. It affects GitLab EE versions 18.4-18.5.4, 18.6-18.6.2, and 18.7-18.7.0. This is an authorization bypass issue that could lead to unauthorized AI model usage.

💻 Affected Systems

Products:
  • GitLab EE
Versions: 18.4 before 18.5.5, 18.6 before 18.6.3, 18.7 before 18.7.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GitLab Enterprise Edition (EE). GitLab CE (Community Edition) is not affected.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could access and utilize proprietary AI models from other namespaces, potentially stealing intellectual property, incurring unauthorized usage costs, or manipulating AI-powered features across the GitLab instance.

🟠

Likely Case

Unauthorized access to AI model settings leading to data leakage of AI configurations and potential misuse of AI capabilities within the GitLab platform.

🟢

If Mitigated

Limited impact if proper namespace isolation and access controls are already in place, though the vulnerability bypasses some authorization checks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and involves manipulating namespace parameters in API requests. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.5.5, 18.6.3, or 18.7.1

Vendor Advisory: https://about.gitlab.com/releases/2026/01/07/patch-release-gitlab-18-7-1-released/

Restart Required: Yes

Instructions:

1. Identify your current GitLab EE version. 2. Upgrade to 18.5.5 if on 18.4-18.5.4, 18.6.3 if on 18.6-18.6.2, or 18.7.1 if on 18.7.0. 3. Follow GitLab's standard upgrade procedures. 4. Restart GitLab services after upgrade.

🔧 Temporary Workarounds

Restrict AI Feature Access

all

Disable AI features or restrict access to AI model settings through GitLab permissions

API Rate Limiting

all

Implement stricter rate limiting on namespace-related API endpoints

🧯 If You Can't Patch

  • Implement strict access controls and audit all AI model usage
  • Monitor API logs for unusual namespace parameter manipulation

🔍 How to Verify

Check if Vulnerable:

Check GitLab version via admin interface or run: sudo gitlab-rake gitlab:env:info | grep 'Version:'

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'Version:'

Verify Fix Applied:

Verify version is 18.5.5, 18.6.3, or 18.7.1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests with manipulated namespace parameters
  • AI model access from unexpected namespaces

Network Indicators:

  • Multiple API requests to namespace endpoints with varying parameters

SIEM Query:

source="gitlab" AND ("namespace" OR "ai_model") AND status=200 AND user NOT IN [authorized_users]

🔗 References

📤 Share & Export