SHARE
Facebook X Pinterest WhatsApp

Multiple GitLab Vulnerabilities Allow Prompt Injection and Data Theft

GitLab has released urgent fixes for vulnerabilities that allow prompt injection and data exposure across its platform.

Written By
thumbnail
Ken Underhill
Ken Underhill
Nov 13, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

GitLab has released a series of urgent security patches addressing multiple vulnerabilities across both its Community Edition (CE) and Enterprise Edition (EE). 

The patched releases — versions 18.5.2, 18.4.4, and 18.3.6 — resolve critical issues that could allow attackers to steal sensitive data, bypass access controls, and compromise AI-powered features. 

According to GitLab, organizations running self-managed instances should update immediately, as several vulnerabilities can be exploited without advanced privileges.

Prompt Injection Attack in GitLab Duo

The most serious flaw involves a prompt injection vulnerability in GitLab Duo’s code review functionality. 

Attackers could insert hidden malicious instructions into merge request comments, tricking the AI into revealing confidential content from private issues. 

GitLab identified the flaw in Enterprise Edition versions 17.9 and later. 

Because this attack requires no overt malware or direct access to protected resources, it poses a threat to development environments that rely on AI-assisted workflows. 

Hidden prompt injection represents an emerging class of AI-specific attacks, where input manipulation leads to data exposure rather than code execution.

Additional Vulnerabilities Across GitLab Components

GitLab’s latest security release addressed several notable vulnerabilities across its platform. 

These include CVE-2025-11224, a high-severity cross-site scripting flaw in the Kubernetes proxy that allows authenticated users to execute malicious scripts, and CVE-2025-11865, an authorization weakness that permits users to remove AI workflows belonging to others. 

The update also patches multiple information disclosure issues, such as CVE-2025-2615 and CVE-2025-7000, which allow blocked users to establish GraphQL subscriptions or view sensitive branch names, as well as CVE-2025-6171, which exposes package metadata even when a repository is restricted. 

Additional fixes include CVE-2025-11990, a path-traversal bug triggered via crafted branch names; CVE-2025-7736, an access control flaw in GitLab Pages that enables OAuth bypasses; and CVE-2025-12983, a denial-of-service issue caused by specially crafted Markdown content.

Upgrade Considerations

GitLab’s cloud-hosted services have already been updated, and no action is required for GitLab.com or GitLab Dedicated customers. 

However, self-managed customers must upgrade immediately. GitLab notes that some updates involve database migrations, and single-node installations will incur downtime. 

Multi-node environments can achieve near-zero downtime upgrades by following GitLab’s recommended procedures on their site.

Additional Security Controls to Reduce Risk

While applying GitLab’s security updates is essential, organizations should also implement additional controls to reduce risk. Some of the additional security controls include:

  • Restrict GitLab Duo and other AI-assisted features to trusted users or projects until stronger prompt-injection protections mature.
  • Enforce strict RBAC and branch protection rules, limiting who can create merge requests, comments, workflows, and sensitive operations.
  • Strengthen logging and monitoring by tracking unusual GraphQL activity, workflow deletions, branch access patterns, and anomalous user behavior.
  • Deploy WAF/XSS protections and sanitize merge request inputs to block malicious scripts, hidden prompts, and crafted payloads before they reach GitLab services.
  • Harden CI/CD pipelines by isolating runners, enforcing least privilege, validating all artifacts, and scanning integrations for insecure dependencies.
  • Restrict public exposure of GitLab instances through network segmentation and IP allowlisting, and regularly rotate tokens, API keys, and OAuth credentials.

As threat actors increasingly leverage AI for more tailored attacks, layered defense and continuous monitoring remain essential.

The latest GitLab security release underscores the growing complexity of securing modern development ecosystems. 

Traditional issues such as XSS, access control failures, and information leaks remain prevalent, but AI-driven features now introduce new attack surfaces. 

This evolving mix of legacy vulnerabilities and emerging AI-driven risks makes zero-trust principles more critical than ever for securing the software development lifecycle.

Recommended for you...

How 43,000 NPM Spam Packages Hid in Plain Sight for Two Years
Ken Underhill
Nov 13, 2025
Operation Endgame Dismantles 1,025 Malware Servers
Dangerous runC Flaws Could Allow Hackers to Escape Docker Containers
Ken Underhill
Nov 13, 2025
SAP Patches Severe Code Injection Flaw Enabling System Takeover
Ken Underhill
Nov 13, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.