Description

GitLab has released an urgent security update for both its Community Edition (CE) and Enterprise Edition (EE), addressing multiple vulnerabilities that pose significant risks to user accounts, sensitive data, and AI configurations. The patched versions—18.7.1, 18.6.3, and 18.5.5—are now available, and GitLab strongly recommends that all self-managed deployments upgrade without delay. The flaws range from high-severity Cross-Site Scripting (XSS) issues to authorization bypasses affecting AI-related features, underscoring the growing attack surface in modern DevOps platforms. Among the most serious issues are three high-severity vulnerabilities. A stored XSS flaw in Markdown processing (CVE-2025-9222, CVSS 8.7) allows authenticated users to embed malicious scripts that execute when other users view the affected content. Another XSS issue in the Web IDE (CVE-2025-13761, CVSS 8.0) can be exploited by unauthenticated attackers, potentially leading to arbitrary script execution if a victim visits a crafted webpage. Additionally, an Enterprise Edition–only authorization bypass in the Duo Workflows API (CVE-2025-13772, CVSS 7.1) enables unauthorized access to AI model settings across namespaces. The release also resolves several medium-severity weaknesses, including improper authorization in AI-related GraphQL mutations, a denial-of-service risk during imports via crafted API responses, and permission flaws allowing manipulation of project runners. Some vulnerabilities affect legacy versions dating back to 10.3, highlighting long-standing exposure. Administrators are advised to upgrade immediately to protect GitLab instances, pipelines, and AI configurations from potential exploitation.