CVE-2025-8405
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-16
Assigner: GitLab Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab_ce | 18.6.2 |
| gitlab | gitlab_ce | 18.4.6 |
| gitlab | gitlab_ce | 18.5.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in GitLab CE/EE allows an authenticated user to perform unauthorized actions on behalf of other users by injecting malicious HTML into vulnerability code flow displays.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized actions being performed by an attacker with authenticated access, potentially compromising user accounts and the integrity of the system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update GitLab CE/EE to a fixed version: 18.4.6 or later if using 18.4.x, 18.5.4 or later if using 18.5.x, or 18.6.2 or later if using 18.6.x. Ensure that only trusted users have authenticated access to GitLab until the update is applied.