CVE-2025-13781

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users in GitLab EE to modify instance-wide AI feature provider settings due to missing authorization checks in GraphQL mutations. It affects GitLab EE versions 18.5 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1. Attackers could potentially alter AI service configurations, affecting all users on the instance.

💻 Affected Systems

Products:
  • GitLab EE
Versions: 18.5 before 18.5.5, 18.6 before 18.6.3, 18.7 before 18.7.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GitLab Enterprise Edition (EE); Community Edition (CE) is not affected. Requires authenticated user access.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could reconfigure AI providers to use malicious endpoints, potentially intercepting sensitive data, poisoning AI responses, or causing service disruption across the entire GitLab instance.

🟠

Likely Case

Unauthorized modification of AI provider settings leading to service misconfiguration, potential data exposure through redirected AI queries, or disruption of AI-powered features.

🟢

If Mitigated

Limited to authenticated users only; proper access controls and monitoring would detect unauthorized configuration changes before significant impact.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of GraphQL mutation endpoints. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.5.5, 18.6.3, or 18.7.1

Vendor Advisory: https://about.gitlab.com/releases/2026/01/07/patch-release-gitlab-18-7-1-released/

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab EE 18.5.5, 18.6.3, or 18.7.1 depending on your current version. 3. Restart GitLab services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable GraphQL mutations for AI settings

all

Temporarily restrict access to GraphQL mutations related to AI provider configuration

# Requires GitLab administrator access to modify application settings

Restrict user permissions

all

Review and tighten user permissions, especially for users who shouldn't have administrative capabilities

# Review user roles and permissions in GitLab Admin Area

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized configuration changes to AI settings
  • Disable AI features entirely if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check GitLab version via Admin Area or command line. If version is 18.5.0-18.5.4, 18.6.0-18.6.2, or 18.7.0, the instance is vulnerable.

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'GitLab Version'

Verify Fix Applied:

After patching, verify version is 18.5.5, 18.6.3, or 18.7.1. Test that only authorized administrators can modify AI provider settings.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized GraphQL mutation attempts to modify AI settings
  • Changes to AI provider configuration by non-admin users

Network Indicators:

  • Unusual GraphQL API requests to AI-related endpoints

SIEM Query:

source="gitlab" AND (graphql_mutation="updateAiProvider" OR graphql_mutation="modifyAiSettings") AND user_role!="admin"

🔗 References

📤 Share & Export