PT-2025-37106 · Gitlab · Gitlab Ce/Ee
Ppee
·
Published
2025-09-10
·
Updated
2025-10-24
·
CVE-2025-6454
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
GitLab CE/EE versions 16.11 through 18.3.2
Description
An issue has been discovered in GitLab CE/EE that allows authenticated users to make unintended internal requests through proxy environments by injecting crafted sequences. The vulnerability resides in the handling of webhook headers, potentially exposing internal endpoints. Approximately 37% of GitLab instances in Runet are estimated to be potentially affected, representing around 30,000 active instances. Exploitation is possible starting with the 'Developer' role and does not require user interaction. Indicators of compromise include requests with non-standard HTTP headers and internal calls to proxy/metadata/local APIs.
Recommendations
Update GitLab to version 18.1.6, 18.2.6, or 18.3.2 or higher.
Check webhook settings and remove or restrict the ability to use non-standard HTTP headers, especially if they are user-controlled.
If GitLab is deployed behind a reverse proxy or in a complex network infrastructure, limit internal resources that GitLab can access.
Exploit
Fix
DoS
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-12841
BIT-GITLAB-2025-6454
CVE-2025-6454
Affected Products
Gitlab Ce/Ee
References · 20
- 🔥 https://hackerone.com/reports/3162711 · Exploit
- https://osv.dev/vulnerability/BIT-gitlab-2025-6454 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-6454 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-12841 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/724499 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-6454 · Security Note
- https://twitter.com/cracbot/status/1968268746856050987 · Twitter Post
- https://t.me/CVEtracker/32352 · Telegram Post
- https://gitlab.com/gitlab-org/gitlab/-/issues/550766 · Note
- https://vuldb.com/ru/?id.323736 · Note
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6454 · Note
- https://securitylab.ru/news/563622.php · Note
- https://twitter.com/CveFindCom/status/1966391093307592806 · Twitter Post
- https://twitter.com/ZeroPathLabs/status/1966394051428577475 · Twitter Post
- https://twitter.com/CVEnew/status/1966393330301833560 · Twitter Post