CVE-2025-8770
GitLab vulnerability analysis and mitigation

Overview

CVE-2025-8770 is a security vulnerability discovered in GitLab Enterprise Edition (EE) affecting all versions from 18.0 prior to 18.0.6, 18.1 prior to 18.1.4, and 18.2 prior to 18.2.2. The vulnerability allows authenticated users with specific access to bypass merge request approval policies by manipulating approval rule identifiers. This vulnerability was discovered internally by GitLab team member Dominic Bauer and was disclosed on August 13, 2025 (GitLab Patch Release, NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The technical nature of the vulnerability involves the manipulation of approval rule identifiers that allows bypassing merge request approval policies (NVD).

Impact

The vulnerability enables authenticated users with specific access to bypass merge request approval policies, which could potentially lead to unauthorized code changes being merged without proper review. This compromises the integrity of the code review process and could potentially lead to the introduction of malicious code or unauthorized changes in the codebase (GitLab Patch Release).

Mitigation and workarounds

GitLab has released patches to address this vulnerability in versions 18.0.6, 18.1.4, and 18.2.2. Organizations running affected versions are strongly recommended to upgrade to the patched versions immediately. GitLab.com is already running the patched version, and GitLab Dedicated customers do not need to take action (GitLab Patch Release).

Community reactions

The vulnerability has been rated as Medium severity in the context of multiple security fixes released by GitLab. Security researchers and the cybersecurity community have noted this vulnerability among several other security issues addressed in the same patch release (GBHackers).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management