- Description
- An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. A proxy feature could potentially allow unintended content rendering leading to XSS under specific circumstances.
- Source
- cve@gitlab.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- cve@gitlab.com
- CWE-79
- Hype score
- Not currently trending
🚨 CVE-2025-0475 🔴 HIGH (8.7) 🏢 GitLab - GitLab 🏗️ 15.10 🔗 https://t.co/7SVkq3GEcm 🔗 https://t.co/m5HUF8rppc #CyberCron #VulnAlert #InfoSec @gitlab https://t.co/cSpgkHwblG
@cybercronai
3 Mar 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-0475 Cross-Site Scripting (XSS) Vulnerability in GitLab CE/EE Proxy Feature https://t.co/pzSjKVnqE7
@VulmonFeeds
3 Mar 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJy6tj (CVE-2025-0475 | GitLab Community Edition/Enterprise Edition up to 17.7.5/17.8.3/17.9.0 cross site scripting) has been published on https://t.co/2mJFHOp4sV
@WolfgangSesin
3 Mar 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-0475: HIGH] Critical security alert for GitLab CE/EE versions 15.10 to 17.7.6, 17.8 to 17.8.4, and 17.9 to 17.9.1. A vulnerability found allowing XSS due to proxy feature issue. Update now.#cybersecurity,#vulnerability https://t.co/gPQRN6PMBa https://t.co/kxiMT2EYxi
@CveFindCom
3 Mar 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Vulnerability Alert: Cross-Site Scripting (XSS) Vulnerabilities in GitLab 📅 Timeline: Disclosure: 2025-01-27, Patch: 2025-02-26 📌 Attribution: GitLab Research Team 🆔cveId: CVE-2025-0475 📊baseScore: 8.7 📏cvssMetrics: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N cvssSeverity:… h
@syedaquib77
27 Feb 2025
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "282D9A25-DA2A-425F-AE91-BF3FA3B49BD1",
"versionEndExcluding": "17.7.6",
"versionStartIncluding": "15.10.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "12A40EC3-CCAA-4967-9634-1B6CE2AAACCA",
"versionEndExcluding": "17.7.6",
"versionStartIncluding": "15.10.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AB79FD0B-E2CB-48C8-9403-FC11D98CE75B",
"versionEndExcluding": "17.8.4",
"versionStartIncluding": "17.8.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BBA524F8-D246-4E22-AD19-D5A7A73BAFDB",
"versionEndExcluding": "17.8.4",
"versionStartIncluding": "17.8.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:17.9.0:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "840493B6-1601-45C8-835A-2ACFBB4A84E2"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:17.9.0:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "520D3C67-BAA9-49B0-8613-7DC0127499D3"
}
],
"operator": "OR"
}
]
}
]