Let's see how we can help you!
Leave a message and our dedicated advisor will contact you.
Send us a message
0/10000
Leave a message and our dedicated advisor will contact you.
If your team uses GitLab, now is not the time for a coffee break. The company has just issued an urgent security release that addresses a critical vulnerability numbered CVE-2025-8243. The flaw received an almost perfect score on the CVSS scale – 9.9/10, which means the situation is truly serious.
The vulnerability lies within the CI/CD mechanism and allows an unauthenticated attacker with access to the GitLab instance to run pipelines on behalf of another user. All it takes is a specially crafted network request.
What does this mean in practice? Imagine someone being able to trigger your application's build and deployment process, but with their own malicious modifications. The consequences could be catastrophic:
The attack is relatively simple to execute and requires no interaction from the victim. The issue affects all versions of GitLab Community Edition (CE) and Enterprise Edition (EE) starting from version 16.5.
GitLab is urging all administrators to immediately update their instances to one of the patched versions: 18.3.2, 18.2.6, or 18.1.6. Time is of the essence here, as typically, after such information is published, cybercriminals quickly begin scanning the internet for unpatched systems.
It seems that even in the world of code, you have to change the locks on your doors regularly. Don't put this off!
Supply chain attacks like this are becoming increasingly common – read our comprehensive guide to 0-day vulnerabilities. Also check out our weekly critical vulnerabilities review for more security alerts.
Source: GitLab Security Release

Chief Technology Officer at SecurHub.pl
PhD candidate in neuroscience. Psychologist and IT expert specializing in cybersecurity.
Adobe warns of a critical vulnerability, CVE-2025-54236 "SessionReaper," which allows for customer account takeover in Adobe Commerce and Magento platforms.
The Cl0p ransomware group exploited a zero-day in Oracle E-Business Suite (CVE-2025-61882), stealing data from multiple companies in August. Oracle just released a patch, but experts warn: check your systems now, as attacks continue.
Google has released an emergency update for the Chrome browser to patch a zero-day vulnerability (CVE-2025-10585) that is already being actively exploited in the wild. Don't wait, update your browser now!
Loading comments...