Skip to main content

CVE-2025-1110: CWE-1220: Insufficient Granularity of Access Control in GitLab GitLab

Low
VulnerabilityCVE-2025-1110cvecve-2025-1110cwe-1220
Published: Thu May 22 2025 (05/22/2025, 14:02:31 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab CE/EE affecting all versions from 18.0 before 18.0.1. In certain circumstances, a user with limited permissions could access Job Data via a crafted GraphQL query.

AI-Powered Analysis

AILast updated: 07/08/2025, 10:40:37 UTC

Technical Analysis

CVE-2025-1110 is a security vulnerability identified in GitLab Community Edition (CE) and Enterprise Edition (EE) affecting version 18.0 prior to 18.0.1. The vulnerability is classified under CWE-1220, which pertains to insufficient granularity of access control. Specifically, this flaw allows a user with limited permissions to access job data by crafting a specially designed GraphQL query. GitLab uses GraphQL as an API query language to enable clients to request exactly the data they need. In this case, the access control mechanisms governing job data exposure were not sufficiently granular, permitting unauthorized data retrieval. The vulnerability does not allow modification or deletion of data, nor does it affect availability; it only impacts confidentiality by exposing job-related information to users who should not have access. The CVSS v3.1 base score is 2.7, indicating a low severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), and only confidentiality is impacted (C:L), with integrity and availability unaffected. No known exploits are reported in the wild, and no patches were linked at the time of this report, suggesting that remediation may be pending or included in a subsequent GitLab release. This vulnerability highlights the importance of fine-grained access control in API endpoints, especially in complex systems like GitLab that manage sensitive CI/CD pipeline data.

Potential Impact

For European organizations using GitLab 18.0, this vulnerability could lead to unauthorized disclosure of job data within CI/CD pipelines. While the impact is limited to confidentiality and considered low severity, exposure of job data may reveal sensitive operational details such as build scripts, environment variables, or deployment configurations. This information could be leveraged in targeted attacks or social engineering campaigns. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive information is inadvertently exposed. However, since exploitation requires a user with high privileges, the risk is somewhat mitigated by internal access controls. Still, insider threats or compromised accounts could exploit this flaw to gain unauthorized insights. The absence of impact on integrity and availability reduces the risk of service disruption or data manipulation. Overall, the threat is moderate for European enterprises but warrants prompt attention to prevent potential data leakage within development and operations teams.

Mitigation Recommendations

European organizations should promptly upgrade GitLab instances from version 18.0 to 18.0.1 or later once the patch is released. Until then, it is advisable to audit and restrict user permissions rigorously, ensuring that only trusted users have high privilege levels capable of exploiting this vulnerability. Implement strict role-based access controls (RBAC) and regularly review user roles and permissions, especially for CI/CD job access. Monitoring GraphQL API usage for anomalous or unexpected queries can help detect exploitation attempts. Additionally, organizations should enforce multi-factor authentication (MFA) for all privileged accounts to reduce the risk of credential compromise. Network segmentation and limiting access to GitLab servers to trusted internal networks can further reduce exposure. Finally, maintain up-to-date backups and incident response plans to quickly address any potential data exposure incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2025-02-07T14:02:01.888Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f33050acd01a249260fac

Added to database: 5/22/2025, 2:21:57 PM

Last enriched: 7/8/2025, 10:40:37 AM

Last updated: 7/11/2025, 5:29:53 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats