Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.5

GitLab: Authentication Bypass via Malicious CI Triggers

CVE-2025-3525
Summary

GitLab has fixed a bug in certain versions of its software that could have allowed an authenticated user to crash the system. This could happen if the user had the right permissions and exploited a weakness in the way the system handled certain API requests. To stay safe, update to the latest version of GitLab.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
gitlab gitlab > 9.0.0 , <= 18.7.5
gitlab gitlab > 9.0.0 , <= 18.7.5
gitlab gitlab > 18.8.0 , <= 18.8.5
gitlab gitlab > 18.8.0 , <= 18.8.5
gitlab gitlab 18.9.0
gitlab gitlab 18.9.0
Original title
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 9.0 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 that could have, under certain circumstances, allowed an aut...
Original description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 9.0 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 that could have, under certain circumstances, allowed an authenticated user with certain access to cause Denial of Service by creating specially crafted CI triggers via the API.
nvd CVSS3.1 6.5
Vulnerability type
CWE-770 Allocation of Resources Without Limits
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026