GitLab has issued critical security patches for GitLab Community Edition (CE) and Enterprise Edition (EE), addressing several high-severity vulnerabilities that put development environments at significant risk. The updates, included in versions 18.6.1, 18.5.3, and 18.4.5, were released to prevent attackers from bypassing authentication, stealing credentials, or crashing GitLab servers through Denial-of-Service (DoS) attacks. While GitLab.com is already protected, administrators managing self-hosted instances are advised to upgrade immediately, as attackers can analyze public patches to weaponize exploits. These vulnerabilities affect core components of GitLab's CI/CD, authentication pipeline, and request-handling architecture, posing threats to both individual developers and large enterprise deployments. One of the most severe issues fixed is CVE-2024-9183, a race condition in the CI/CD caching mechanism that could allow authenticated attackers to intercept or steal credentials belonging to higher-privileged users. By exploiting timing flaws in how cache data is written and retrieved, threat actors could escalate their privileges or take over administrative accounts. GitLab also patched CVE-2025-12571, a critical Denial-of-Service vulnerability enabling unauthenticated attackers to crash GitLab servers by sending malformed JSON requests. This flaw can instantly disrupt development pipelines, stop code deployments, and halt automated workflows. A third issue, CVE-2025-12653, allows unauthorized users to bypass organizational membership checks by manipulating specific network request headers, enabling them to join or access restricted groups without permission. To mitigate exposure, GitLab strongly urges all users to upgrade to the latest patch versions. Single-node deployments should expect downtime due to required database migrations, while multi-node clusters can complete the updates with zero downtime. Failure to apply these security updates leaves systems exposed to credential theft, service outages, and unauthorized access to sensitive project repositories. With GitLab widely used across sectors such as technology, finance, manufacturing, and government, timely patching is essential to prevent exploitation and maintain operational and security integrity.
Cybercriminals are intensifying their attacks on the telecommunications and media sector, targeting critical infrastructure with sophisticated methods. Recent security analysis rev...
Bloody Wolf, a long-running threat actor active since at least 2023, has expanded its activity across Central Asia, targeting organizations in Kyrgyzstan and Uzbekistan throughout ...
A widespread supply-chain attack has targeted the npm ecosystem, where several JavaScript packages were found distributing a sophisticated malware strain known as Shai-Hulud. The m...