CVE-2025-0475
Published: 03 March 2025
Summary
CVE-2025-0475 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Gitlab Gitlab. Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked in the top 26.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Information output filtering directly prevents XSS by ensuring unintended content from the GitLab proxy feature is sanitized or encoded before rendering.
Information input validation rejects or sanitizes malicious payloads crafted for the proxy feature, blocking XSS exploitation.
Flaw remediation mandates timely patching of the GitLab proxy vulnerability, eliminating the root cause of unintended content rendering.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS in web proxy directly enables browser session hijacking and theft of web session cookies via malicious script execution in victim context.
NVD Description
An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. A proxy feature could potentially allow unintended content rendering leading to XSS under specific circumstances.
Deeper analysisAI
CVE-2025-0475 is a cross-site scripting (XSS) vulnerability, classified under CWE-79, in the proxy feature of GitLab Community Edition (CE) and Enterprise Edition (EE). It affects all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. The issue arises from unintended content rendering under specific circumstances, with a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality and integrity.
An authenticated user with low privileges can exploit this vulnerability over the network by crafting malicious content that leverages the proxy feature. Exploitation requires user interaction, such as a victim clicking or interacting with the rendered content, leading to XSS execution in the context of the changed scope. Successful attacks can result in high confidentiality and integrity impacts, potentially allowing attackers to steal sensitive data or manipulate the victim's session.
Mitigation involves upgrading to GitLab versions 17.7.6, 17.8.4, or 17.9.1 or later, as indicated by the affected version ranges. Additional details are available in the GitLab issue tracker at https://gitlab.com/gitlab-org/gitlab/-/issues/513142 and the HackerOne disclosure report at https://hackerone.com/reports/2932309.
Details
- CWE(s)