Home

Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.7 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2, that could have allowed a blocked user to access sensitive information by establishing GraphQL subscriptions through WebSocket connections.

PUBLISHED Reserved 2025-03-21 | Published 2025-11-15 | Updated 2025-11-17 | Assigner GitLab




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

Default status
unaffected

16.7 (semver) before 18.3.6
affected

18.4 (semver) before 18.4.4
affected

18.5 (semver) before 18.5.2
affected

Credits

Thanks [rogerace](https://hackerone.com/rogerace) for reporting this vulnerability through our HackerOne bug bounty program. finder

References

about.gitlab.com/...12/patch-release-gitlab-18-5-2-released/

gitlab.com/gitlab-org/gitlab/-/issues/526360 (GitLab Issue #526360) issue-tracking permissions-required

hackerone.com/reports/3049150 (HackerOne Bug Bounty Report #3049150) technical-description exploit permissions-required

cve.org (CVE-2025-2615)

nvd.nist.gov (CVE-2025-2615)

Download JSON