EUVD-2025-18169

| CVE-2025-4278 HIGH
2025-06-12 [email protected]
8.7
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 14, 2026 - 21:20 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:20 euvd
EUVD-2025-18169
CVE Published
Jun 12, 2025 - 10:16 nvd
HIGH 8.7

Description

An issue has been discovered in GitLab CE/EE affecting all versions starting with 18.0 before 18.0.2. Under certain conditions html injection in new search page could lead to account takeover.

Analysis

CVE-2025-4278 is an HTML injection vulnerability in GitLab CE/EE versions 18.0.0 through 18.0.1 that allows authenticated attackers to inject malicious HTML through the new search page. Under specific conditions, this vulnerability can escalate to account takeover by leveraging user interaction (UI requirement), with a CVSS score of 8.7 indicating high severity. The vulnerability requires low attack complexity and network accessibility, making it a significant risk for organizations running affected GitLab versions.

Technical Context

This vulnerability is rooted in CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page), which occurs when user-supplied input is not properly sanitized before being rendered in HTML context. In GitLab's new search page functionality, inadequate input validation allows attackers to inject arbitrary HTML/JavaScript payloads. The vulnerability exists in the search parameter processing logic of GitLab CE/EE (CPE identifiers: cpe:2.3:a:gitlab:gitlab:* versions 18.0.0-18.0.1). The root cause stems from insufficient output encoding or input validation in the search feature's rendering pipeline, enabling stored or reflected HTML injection that executes in the victim's browser session within the GitLab application context.

Affected Products

GitLab Community Edition (CE) (18.0.0 through 18.0.1); GitLab Enterprise Edition (EE) (18.0.0 through 18.0.1)

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Vendor Status

Ubuntu

Priority: Medium
gitlab
Release Status Version
xenial ignored -
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -

Debian

gitlab
Release Status Fixed Version Urgency
sid fixed 17.6.5-19 -
(unstable) not-affected - -

Share

EUVD-2025-18169 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy