CVE-2025-12983
GitLab Schwachstellenanalyse und -minderung

Überblick

GitLab has identified a low-severity vulnerability (CVE-2025-12983) affecting both Community Edition (CE) and Enterprise Edition (EE). The vulnerability was discovered in GitLab's markdown processing functionality and affects all versions from 16.9 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2. The issue was reported through GitLab's HackerOne bug bounty program by security researcher phli (GitLab Release).

Technische Details

The vulnerability is characterized by a denial of service condition that can be triggered through specially crafted markdown content containing nested formatting patterns. The severity of this vulnerability has been assessed with a CVSS score of 3.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L), indicating a low-severity issue requiring network access and authenticated user privileges to exploit (GitLab Release).

Aufprall

When successfully exploited, the vulnerability allows an authenticated user to cause a denial of service condition in the GitLab instance by submitting markdown content with specific nested formatting patterns. This could potentially affect the availability of the markdown rendering service (GitLab Release).

Risikominderung und Problemumgehungen

GitLab has released patches for this vulnerability in versions 18.5.2, 18.4.4, and 18.3.6. Organizations running affected versions are strongly recommended to upgrade to the patched versions immediately. GitLab.com has already been updated with the necessary patches, and GitLab Dedicated customers do not need to take any action (GitLab Release).

Reaktionen der Community

The vulnerability has been acknowledged as part of a larger security update that included multiple security fixes. Security researchers and industry professionals have noted this as a relatively low-risk vulnerability compared to other issues patched in the same release (Security Online).

Zusätzliche Ressourcen


QuelleDieser Bericht wurde mithilfe von KI erstellt

Verwandt GitLab Schwachstellen:

CVE-Kennung

Strenge

Punktzahl

Technologieen

Name der Komponente

CISA KEV-Exploit

Hat fix

Veröffentlichungsdatum

CVE-2025-6171MEDIUM5.3
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NeinJaNov 15, 2025
CVE-2025-7000MEDIUM4.3
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NeinJaNov 15, 2025
CVE-2025-12983LOW3.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NeinJaNov 15, 2025
CVE-2025-6945LOW3.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NeinJaNov 15, 2025
CVE-2025-7736LOW3.1
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NeinJaNov 15, 2025

Kostenlose Schwachstellenbewertung

Benchmarking Ihrer Cloud-Sicherheitslage

Bewerten Sie Ihre Cloud-Sicherheitspraktiken in 9 Sicherheitsbereichen, um Ihr Risikoniveau zu bewerten und Lücken in Ihren Abwehrmaßnahmen zu identifizieren.

Bewertung anfordern

Eine personalisierte Demo anfordern

Sind Sie bereit, Wiz in Aktion zu sehen?

"Die beste Benutzererfahrung, die ich je gesehen habe, bietet vollständige Transparenz für Cloud-Workloads."
David EstlickCISO
"„Wiz bietet eine zentrale Oberfläche, um zu sehen, was in unseren Cloud-Umgebungen vor sich geht.“ "
Adam FletcherSicherheitsbeauftragter
"„Wir wissen, dass, wenn Wiz etwas als kritisch identifiziert, es auch tatsächlich ist.“"
Greg PoniatowskiLeiter Bedrohungs- und Schwachstellenmanagement