CVE-2025-2254
BaseFortify
Publication date: 2025-06-12
Last updated on: 2025-08-08
Assigner: GitLab Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab | From 17.9.0 (inc) to 17.10.8 (exc) |
| gitlab | gitlab | From 17.9.0 (inc) to 17.10.8 (exc) |
| gitlab | gitlab | From 17.11.0 (inc) to 17.11.4 (exc) |
| gitlab | gitlab | From 17.11.0 (inc) to 17.11.4 (exc) |
| gitlab | gitlab | From 18.0.0 (inc) to 18.0.2 (exc) |
| gitlab | gitlab | From 18.0.0 (inc) to 18.0.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Scripting (XSS) issue in GitLab CE/EE affecting certain versions before specific patches. It is caused by improper output encoding in the snippet viewer functionality, which allows attackers to inject malicious scripts that can be executed in the context of a user's browser.
How can this vulnerability impact me? :
The vulnerability can lead to Cross-Site Scripting attacks, which may allow attackers to steal sensitive information, hijack user sessions, or perform actions on behalf of the user without their consent. This can compromise confidentiality and integrity of data and user interactions within GitLab.