Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Abuse Entra ID to Exfiltrate Microsoft Accounts Azure
May 19, 2026
Mythos Previews Build PoC Exploits for Automated Vulner
May 19, 2026
Hackers Actively Exploiting Critical NGIN NGINX Vulnerability
May 18, 2026
Home/CyberSecurity News/GitLab Patches Critical DoS & XSS Vulner Multiple Vulnerabilities
CyberSecurity News

GitLab Patches Critical DoS & XSS Vulner Multiple Vulnerabilities

GitLab has issued a critical security update for its Community Edition (CE) and Enterprise Edition (EE), addressing multiple high-severity vulnerabilities. The patches, available in versions 18.8.4,...

Jennifer sherman
Jennifer sherman
February 11, 2026 2 Min Read
6 0

GitLab has issued a critical security update for its Community Edition (CE) and Enterprise Edition (EE), addressing multiple high-severity vulnerabilities.

The patches, available in versions 18.8.4, 18.7.4, and 18.6.6, fix flaws that could allow attackers to crash servers, steal data, or hijack user sessions.

Security experts urge administrators of self-managed instances to upgrade immediately, noting that GitLab.com has already been patched.​

The most severe vulnerability, tracked as CVE-2025-7659 (CVSS 8.0), lies in the Web IDE. This flaw involves “incomplete validation,” meaning the system fails to verify who is accessing certain data properly.

An unauthenticated attacker, someone without a username or password, could exploit this to steal access tokens and view private software repositories.​

CVE ID Severity Type Description
CVE-2025-7659 High (8.0) Token Theft Unauthenticated access to private tokens via Web IDE.
CVE-2025-8099 High (7.5) DoS Service crash via repeated GraphQL queries.
CVE-2026-0958 High (7.5) DoS Resource exhaustion via JSON validation bypass.
CVE-2025-14560 High (7.3) XSS malicious script injection in Code Flow.

The update also resolves two dangerous Denial-of-Service (DoS) issues. In a DoS attack, a hacker tries to overwhelm a system to knock it offline.

CVE-2025-8099 (CVSS 7.5) allows attackers to crash the service by sending repeated, complex queries to the GraphQL interface.

CVE-2026-0958 (CVSS 7.5) exploits the JSON validation middleware, letting attackers exhaust the server’s memory or CPU.​

Another major fix addresses CVE-2025-14560 (CVSS 7.3), a Cross-Site Scripting (XSS) vulnerability in the “Code Flow” feature. XSS flaws allow attackers to inject malicious scripts into trusted websites.

In this case, an attacker could hide code that executes when another user views it, potentially allowing them to perform actions on behalf of that victim.​

GitLab strongly recommends that all customers running affected versions upgrade to the latest patch immediately.

While the update fixes these critical issues, it also addresses several medium-severity bugs, including Server-Side Request Forgery (SSRF) and HTML injection flaws.

Administrators should be aware that upgrading single-node instances may require brief downtime for database migrations.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitHackerPatchSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Windows RDP 0-Day Exploited: Critical Remote Desktop

Next Post

Windows Notepad Flaw Allows Remote Code Execution by Attackers

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
CISA Warns: Microsoft Exchange Vulnerability Exploited
May 18, 2026
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us