Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade to versions 18.3.4, 18.4.2 or above.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* |
Thu, 09 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Oct 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GitLab has remediated an issue in GitLab EE affecting all versions from 18.3 to 18.3.4, 18.4 to 18.4.2 that, under certain conditions, could have allowed authenticated users with read-only API tokens to perform unauthorized write operations on vulnerability records by exploiting incorrectly scoped GraphQL mutations. | |
| Title | Incorrect Authorization in GitLab | |
| First Time appeared |
Gitlab
Gitlab gitlab |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gitlab
Gitlab gitlab |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2025-10-09T13:43:00.365Z
Reserved: 2025-10-06T00:07:35.705Z
Link: CVE-2025-11340
Updated: 2025-10-09T13:42:55.117Z
Status : Analyzed
Published: 2025-10-09T12:15:35.233
Modified: 2025-10-20T21:00:37.130
Link: CVE-2025-11340
No data.
OpenCVE Enrichment
No data.