Cyber Posture

CVE-2025-0475

High

Published: 03 March 2025

Published
03 March 2025
Modified
07 March 2025
KEV Added
Patch
CVSS Score 8.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0076 73.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0475 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Gitlab Gitlab. Its CVSS base score is 8.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked in the top 26.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Browser Session Hijacking (T1185) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Information output filtering directly prevents XSS by ensuring unintended content from the GitLab proxy feature is sanitized or encoded before rendering.

prevent

Information input validation rejects or sanitizes malicious payloads crafted for the proxy feature, blocking XSS exploitation.

prevent

Flaw remediation mandates timely patching of the GitLab proxy vulnerability, eliminating the root cause of unintended content rendering.

MITRE ATT&CK Enterprise TechniquesAI

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

XSS in web proxy directly enables browser session hijacking and theft of web session cookies via malicious script execution in victim context.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. A proxy feature could potentially allow unintended content rendering leading to XSS under specific circumstances.

Deeper analysisAI

CVE-2025-0475 is a cross-site scripting (XSS) vulnerability, classified under CWE-79, in the proxy feature of GitLab Community Edition (CE) and Enterprise Edition (EE). It affects all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. The issue arises from unintended content rendering under specific circumstances, with a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality and integrity.

An authenticated user with low privileges can exploit this vulnerability over the network by crafting malicious content that leverages the proxy feature. Exploitation requires user interaction, such as a victim clicking or interacting with the rendered content, leading to XSS execution in the context of the changed scope. Successful attacks can result in high confidentiality and integrity impacts, potentially allowing attackers to steal sensitive data or manipulate the victim's session.

Mitigation involves upgrading to GitLab versions 17.7.6, 17.8.4, or 17.9.1 or later, as indicated by the affected version ranges. Additional details are available in the GitLab issue tracker at https://gitlab.com/gitlab-org/gitlab/-/issues/513142 and the HackerOne disclosure report at https://hackerone.com/reports/2932309.

Details

CWE(s)

Affected Products

gitlab
gitlab
17.9.0 · 15.10.0 — 17.7.6 · 15.10.0 — 17.7.6 · 17.8.0 — 17.8.4

CVEs Like This One

CVE-2025-11224Same product: Gitlab Gitlab
CVE-2025-6948Same product: Gitlab Gitlab
CVE-2025-0555Same product: Gitlab Gitlab
CVE-2025-0376Same product: Gitlab Gitlab
CVE-2025-13761Same product: Gitlab Gitlab
CVE-2025-12716Same product: Gitlab Gitlab
CVE-2026-1090Same product: Gitlab Gitlab
CVE-2025-14560Same product: Gitlab Gitlab
CVE-2025-0811Same product: Gitlab Gitlab
CVE-2026-0752Same product: Gitlab Gitlab

References