CVE-2025-12734
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-17
Assigner: GitLab Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab | 18.4.6 |
| gitlab | gitlab | 18.5.4 |
| gitlab | gitlab | 18.6.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in GitLab CE/EE affects versions from 15.6 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2. It allows an authenticated user to leak sensitive information by using specifically crafted merge request titles.
How can this vulnerability impact me? :
The vulnerability can lead to information disclosure, where an authenticated user could leak sensitive information from merge request titles. This could expose confidential data to unauthorized users, potentially compromising project privacy and security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should immediately upgrade your GitLab instance to one of the patched versions: 18.4.6, 18.5.4, or 18.6.2, depending on your current version. These patch releases address the information disclosure issue related to specially crafted merge request titles. [1]