GitLab has released crucial security updates to address six vulnerabilities found in both its Community Edition (CE) and Enterprise Edition (EE). Notably, two of these are high-impact cross-site scripting (XSS) vulnerabilities that pose a significant risk, particularly to self-hosted environments. Under certain configurations, these vulnerabilities could be exploited to run unauthorized scripts or gain illicit access to sensitive information. The fixes are included in versions 18.2.1, 18.1.3, and 18.0.5, targeting critical vulnerabilities that could threaten the integrity of the system. One of the primary issues is CVE-2025-4700, a high-risk XSS vulnerability rated with a CVSS score of 8.7. It impacts all versions from 15.10 up to the fixed releases and could enable attackers to manipulate how content is rendered in specific scenarios involving Kubernetes proxy functionality. Another significant vulnerability, CVE-2025-4439, carries a CVSS score of 7.7 and affects instances operating behind certain CDNs. Under particular network setups, authenticated users may exploit this flaw to execute XSS attacks. Both of these critical vulnerabilities were responsibly disclosed by security researcher joaxcar via GitLab’s HackerOne program, emphasizing the value of community-driven security initiatives. Additionally, four medium-severity flaws have been addressed, involving information exposure and permission-related issues. CVE-2025-7001 impacts how the API processes resource group information, which may unintentionally allow privileged users to view data that should remain confidential. CVE-2025-4976 targets the Enterprise Edition from version 17.0 onward and might lead to unauthorized visibility of internal notes within GitLab Duo response data under specific conditions. GitLab urges users with self-hosted systems to update immediately, while GitLab.com and Dedicated users are already secured. The company continues to uphold transparency by releasing detailed disclosures via their public tracker 30 days after each patch.
A Chinese state-sponsored advanced persistent threat (APT) group has been linked to the compromise of a military organization based in the Philippines through the deployment of a n...
Cybersecurity experts have detected two new malware families: CHILLYHELL, a macOS backdoor with modularity, and ZynorRAT, a remote access trojan using Go for Windows and Linux syst...
Siemens has issued a critical security advisory regarding a newly discovered vulnerability in its SIMATIC Virtualization as a Service (SIVaaS) platform. Tracked as CVE-2025-40804, ...