CVE-2025-10871
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-26

Last updated on: 2025-09-29

Assigner: GitLab Inc.

Description
An issue has been discovered in GitLab EE affecting all versions from 16.6 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1. Project Maintainers can exploit a vulnerability where they can assign custom roles to users with permissions exceeding their own, effectively granting themselves elevated privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-26
Last Modified
2025-09-29
Generated
2026-05-07
AI Q&A
2025-09-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
gitlab gitlab From 16.6.0 (inc) to 18.2.7 (exc)
gitlab gitlab From 16.6.0 (inc) to 18.2.7 (exc)
gitlab gitlab From 18.3.0 (inc) to 18.3.3 (exc)
gitlab gitlab From 18.3.0 (inc) to 18.3.3 (exc)
gitlab gitlab 18.4.0
gitlab gitlab 18.4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in GitLab EE allows Project Maintainers to assign custom roles to users with permissions that exceed their own, effectively enabling them to grant themselves elevated privileges.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized privilege escalation where Project Maintainers can gain higher permissions than intended, potentially compromising the security and integrity of the project and its data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart