First published: Thu Apr 10 2025(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions from 7.7 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. Under certain conditions, an attacker could potentially trick users into unintentionally authorizing sensitive actions on their behalf.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab Community Edition | >=7.7<17.8.7>=17.9<17.9.6>=17.10<17.10.4 |
Upgrade to versions 17.8.7, 17.9.6, 17.10.4 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0362 has been classified with a high severity, as it allows attackers to potentially trick users into authorizing sensitive actions.
To fix CVE-2025-0362, update GitLab CE/EE to version 17.8.7, 17.9.6, or 17.10.4 or later.
CVE-2025-0362 affects GitLab CE/EE versions from 7.7 up to but not including 17.8.7, 17.9 up to but not including 17.9.6, and 17.10 up to but not including 17.10.4.
Yes, CVE-2025-0362 can potentially lead to unauthorized access to sensitive user actions, impacting data security.
There is no known workaround for CVE-2025-0362; upgrading to the patched versions is the recommended solution.