Cyber Posture

CVE-2025-13761

High

Published: 09 January 2026

Published
09 January 2026
Modified
22 January 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0005 14.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13761 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Gitlab Gitlab. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 ensures timely patching of the specific XSS flaw in GitLab versions prior to 18.6.3 and 18.7.1, directly remediating the vulnerability as recommended by GitLab.

prevent

SI-15 filters malicious JavaScript output from GitLab pages viewed in authenticated users' browsers, preventing arbitrary code execution via specially crafted webpages.

prevent

SI-10 validates untrusted inputs from unauthenticated users to block injection of XSS payloads that could execute in the context of authenticated sessions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

XSS in public-facing GitLab enables browser JS execution (T1059.007) after exploiting the web app (T1190) and directly supports session hijacking (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an unauthenticated user to execute arbitrary code in the context of an authenticated user's browser by convincing…

more

the legitimate user to visit a specially crafted webpage.

Deeper analysisAI

CVE-2025-13761 is a cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting GitLab Community Edition (CE) and Enterprise Edition (EE) in all versions from 18.6 prior to 18.6.3 and from 18.7 prior to 18.7.1. The flaw enables an unauthenticated user to execute arbitrary code within the context of an authenticated user's browser by tricking the legitimate user into visiting a specially crafted webpage. It carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N), reflecting high severity due to its potential for confidentially and integrity impacts across a changed scope.

An unauthenticated attacker can exploit this vulnerability by socially engineering an authenticated GitLab user—such as a project maintainer or developer—into interacting with a malicious webpage, for example via phishing or a shared link. Successful exploitation grants the attacker the ability to run arbitrary JavaScript in the victim's browser session, potentially leading to session hijacking, data theft from the GitLab interface, or further actions leveraging the user's permissions, such as accessing repositories or triggering workflows.

GitLab has remediated the issue through patch releases, including GitLab 18.7.1 as detailed in their January 7, 2026 release notes, with corresponding fixes for the 18.6 branch in version 18.6.3. Security practitioners should upgrade affected instances immediately, as outlined in the official GitLab security issue tracker (gitlab.com/gitlab-org/gitlab/-/issues/582237) and the originating HackerOne report (hackerone.com/reports/3441368). No workarounds are specified beyond applying the patches.

Details

CWE(s)

Affected Products

gitlab
gitlab
18.7.0 · 18.6.0 — 18.6.3 · 18.6.0 — 18.6.3

CVEs Like This One

CVE-2025-14560Same product: Gitlab Gitlab
CVE-2025-6948Same product: Gitlab Gitlab
CVE-2025-0555Same product: Gitlab Gitlab
CVE-2026-0752Same product: Gitlab Gitlab
CVE-2025-0314Same product: Gitlab Gitlab
CVE-2025-0376Same product: Gitlab Gitlab
CVE-2025-2255Same product: Gitlab Gitlab
CVE-2025-12716Same product: Gitlab Gitlab
CVE-2026-1090Same product: Gitlab Gitlab
CVE-2025-11224Same product: Gitlab Gitlab

References