Original Article Text

Click to Toggle View

GitLab patches critical authentication bypass vulnerabilities. GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE), fixing nine vulnerabilities, among which two critical severity ruby-saml library authentication bypass flaws. All flaws were addressed in GitLab CE/EE versions 17.7.7, 17.8.5, and 17.9.2, while all versions before those are vulnerable.  GitLab.com is already patched, and GitLab Dedicated customers will be updated automatically, but users who maintain self-managed installations on their own infrastructure will need to apply the updates manually. "We strongly recommend that all installations running a version affected by the issues described below are upgraded to the latest version as soon as possible," warns the bulletin. The two critical flaws GitLab addressed this time are CVE-2025-25291 and CVE-2025-25292, both in the ruby-saml library, which is used for SAML Single Sign-On (SSO) authentication at the instance or group level. These vulnerabilities allow an authenticated attacker with access to a valid signed SAML document to impersonate another user within the same SAML Identity Provider (IdP) environment. This means an attacker could gain unauthorized access to another user's account, leading to potential data breaches, privilege escalation, and other security risks. GitHub discovered the ruby-saml bugs and has published a technical deep dive into the two flaws, noting that its platform hasn't been impacted as the use of the ruby-saml library stopped in 2014. "GitHub doesn't currently use ruby-saml for authentication, but began evaluating the use of the library with the intention of using an open source library for SAML authentication once more," explains GitHub's writeup. "This library is, however, used in other popular projects and products. We discovered an exploitable instance of this vulnerability in GitLab, and have notified their security team so they can take necessary actions to protect their users against potential attacks." Of the rest of the issues fixed by GitLab, one that stands out is a high-severity remote code execution issue tracked under CVE-2025-27407. The flaw allows an attacker-controlled authenticated user to exploit the Direct Transfer feature, which is disabled by default, to achieve remote code execution. The remaining issues are low to medium-severity problems concerning the denial of service (DoS), credential exposure, and shell code injection, all exploitable with elevated privileges. GitLab users who cannot upgrade immediately to a safe version are advised to apply the following mitigations in the meantime: While these steps significantly reduce the risk of exploitation, they should only be treated as temporary mitigation measures until upgrading to GitLab 17.9.2, 17.8.5, or 17.7.7 is practically possible. To update GitLab, head to the official downloads hub. GitLab Runner installation instructions are available here. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // GitLab Fixes Critical Authentication Flaws in Latest Update

GitLab released updates for critical vulnerabilities in their Community Edition (CE) and Enterprise Edition (EE), specifically patching two severe flaws in the ruby-saml library.

The vulnerabilities, identified as CVE-2025-25291 and CVE-2025-25292, allowed attackers to impersonate other users within the same SAML Identity Provider environment.

All GitLab versions prior to 17.7.7, 17.8.5, and 17.9.2 are affected and vulnerable to these security issues.

GitLab.com has been secured with patches, and dedicated customers will receive automatic updates; however, self-managed installations require manual update intervention.

In addition to the critical flaws, GitLab corrected other issues, including a high-severity remote code execution vulnerability and several lower-severity problems related to DoS, credential exposure, and shell code injection.

Temporary mitigation measures are suggested for users who cannot immediately upgrade to the fully patched versions.