CVE-2025-10871
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-09-26
Last updated on: 2025-09-29
Assigner: GitLab Inc.
Description
Description
An issue has been discovered in GitLab EE affecting all versions from 16.6 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1. Project Maintainers can exploit a vulnerability where they can assign custom roles to users with permissions exceeding their own, effectively granting themselves elevated privileges.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab | From 16.6.0 (inc) to 18.2.7 (exc) |
| gitlab | gitlab | From 16.6.0 (inc) to 18.2.7 (exc) |
| gitlab | gitlab | From 18.3.0 (inc) to 18.3.3 (exc) |
| gitlab | gitlab | From 18.3.0 (inc) to 18.3.3 (exc) |
| gitlab | gitlab | 18.4.0 |
| gitlab | gitlab | 18.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in GitLab EE allows Project Maintainers to assign custom roles to users with permissions that exceed their own, effectively enabling them to grant themselves elevated privileges.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized privilege escalation where Project Maintainers can gain higher permissions than intended, potentially compromising the security and integrity of the project and its data.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70