CVE-2025-1763

8.7 HIGH

📋 TL;DR

This vulnerability in GitLab EE allows attackers to execute malicious scripts in users' browsers by bypassing Content Security Policy protections. It affects all GitLab EE installations running vulnerable versions, potentially compromising user sessions and data.

💻 Affected Systems

Products:
  • GitLab EE
Versions: 16.6 to 17.9.6, 17.10 to 17.10.4, 17.11 to 17.11.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GitLab Enterprise Edition (EE), not Community Edition (CE). Requires user interaction or specific conditions for exploitation.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized actions performed in the context of authenticated users.

🟢

If Mitigated

Limited impact with proper CSP headers and browser security features, though some bypass techniques may still succeed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific conditions and user interaction. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.9.7, 17.10.5, or 17.11.1

Vendor Advisory: https://gitlab.com/gitlab-org/gitlab/-/issues/521718

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab EE version 17.9.7, 17.10.5, or 17.11.1 depending on your current version. 3. Restart GitLab services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Content Security Policy Enhancement

all

Implement stricter CSP headers to reduce XSS impact

# Add to GitLab configuration
# Example CSP header in nginx:
# add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval';" always;

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers
  • Restrict user access to only trusted sources and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check GitLab version via admin interface or command: sudo gitlab-rake gitlab:env:info

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'GitLab version'

Verify Fix Applied:

Verify version is 17.9.7, 17.10.5, or 17.11.1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution patterns
  • Suspicious user agent strings
  • Multiple failed CSP violations

Network Indicators:

  • Unexpected external script loads
  • Suspicious iframe or redirect patterns

SIEM Query:

source="gitlab" AND (event="csp_violation" OR event="xss_attempt")

🔗 References

📤 Share & Export