
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-7001 is a medium-severity vulnerability affecting GitLab Community Edition (CE) and Enterprise Edition (EE) that was disclosed in July 2025. The vulnerability allows privileged users to access certain resource_group information through the API which should have been unavailable. This issue affects all versions of GitLab CE/EE from 15.0 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 (GitLab Patch).
The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (Medium) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. This scoring indicates that the vulnerability requires network access and low privileges to exploit, with no user interaction needed. The impact is limited to confidentiality, with no effects on integrity or availability (GitLab Patch).
The vulnerability allows privileged users to access resource_group information through the API that should be restricted, potentially leading to unauthorized exposure of sensitive information. The impact is primarily focused on confidentiality breaches, though limited in scope (GBHackers, Cybersecurity News).
GitLab has released patches to address this vulnerability in versions 18.2.1, 18.1.3, and 18.0.5 for both Community Edition (CE) and Enterprise Edition (EE). Organizations are strongly recommended to upgrade to these patched versions immediately. GitLab.com is already running the patched version, while GitLab Dedicated customers require no action (GitLab Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."