GitLab has rolled out critical security updates in versions 18.5.1, 18.4.3, and 18.3.5 of both its Community Edition (CE) and Enterprise Edition (EE) to patch multiple vulnerabilities, including a high-severity flaw that could lead to project runner hijacking and several Denial-of-Service (DoS) issues. The most severe bug, CVE-2025-11702 (CVSS 8.5), stems from improper access control within the runner API, allowing authenticated users with specific permissions to hijack runners from other projects in the same GitLab instance. Successful exploitation could let attackers take over CI/CD infrastructure, steal secrets, or inject malicious code into automated build pipelines—posing a critical threat to organizations running shared runners. In addition, GitLab addressed three DoS vulnerabilities that could be exploited even by unauthenticated users. These include CVE-2025-10497 and CVE-2025-11447 (both CVSS 7.5), which allow service disruption through crafted payloads during event collection and GraphQL request validation, respectively. Another DoS issue, CVE-2025-11974 (CVSS 6.5), enables attackers to overwhelm systems by uploading excessively large files to specific API endpoints. The affected versions span across major GitLab releases from 11.0 through 18.5, underscoring the widespread exposure of production environments to these flaws. Further patches fix moderate-severity issues such as CVE-2025-11971 (improper authorization in pipeline builds) and CVE-2025-6601 (a business logic flaw in group membership handling). GitLab urges users to upgrade immediately to mitigate potential exploitation risks, as these vulnerabilities could be weaponized to compromise build integrity or disrupt availability across CI/CD workflows.
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...
A new Windows malware called ResokerRAT has been discovered, which allows attackers to secretly control infected systems. This malware uses Telegram instead of traditional servers ...
A vulnerability has been identified in Google Cloud’s Vertex AI platform that could allow unauthorized users to access sensitive data associated with machine learning workloads. ...