CVE-2025-14560

7.3 HIGH

📋 TL;DR

This vulnerability in GitLab allows an authenticated attacker to inject malicious content into the vulnerability code flow, potentially performing unauthorized actions on behalf of other users. It affects GitLab Community Edition and Enterprise Edition installations running vulnerable versions. The issue stems from improper neutralization of user input in web pages (CWE-79).

💻 Affected Systems

Products:
  • GitLab Community Edition
  • GitLab Enterprise Edition
Versions: All versions from 17.1 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4
Operating Systems: All operating systems running GitLab
Default Config Vulnerable: ⚠️ Yes
Notes: All GitLab deployments running affected versions are vulnerable regardless of configuration.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could impersonate other users, potentially accessing sensitive data, modifying repositories, or performing administrative actions without proper authorization.

🟠

Likely Case

Attackers with regular user accounts could perform unauthorized actions on behalf of other users within their organization, potentially accessing restricted data or modifying projects they shouldn't have access to.

🟢

If Mitigated

With proper input validation and output encoding in place, the attack would fail to execute, preventing unauthorized actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and specific conditions to inject content into the vulnerability code flow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.6.6, 18.7.4, or 18.8.4

Vendor Advisory: https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released/

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab 18.6.6, 18.7.4, or 18.8.4 depending on your current version. 3. Restart GitLab services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict user permissions

all

Limit user permissions to minimum required levels to reduce potential impact if exploited.

Implement WAF rules

all

Configure web application firewall rules to detect and block injection attempts in vulnerability-related endpoints.

🧯 If You Can't Patch

  • Isolate GitLab instance from internet access if possible
  • Implement strict access controls and monitor for suspicious user activity

🔍 How to Verify

Check if Vulnerable:

Check your GitLab version against affected ranges: 17.1-18.6.5, 18.7.0-18.7.3, or 18.8.0-18.8.3

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'Version:'

Verify Fix Applied:

Verify GitLab version is 18.6.6, 18.7.4, or 18.8.4 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual user impersonation attempts
  • Suspicious vulnerability-related API calls
  • Unexpected user privilege escalations

Network Indicators:

  • Unusual patterns in vulnerability endpoint requests
  • Multiple failed authentication attempts followed by successful exploitation

SIEM Query:

source="gitlab" AND (event="vulnerability_*" OR event="user_impersonation") AND status="success" AND user!="admin"

🔗 References

📤 Share & Export