gitlab-workhorse-ce-fips-18.2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gitlab-workhorse-ce-fips-18.2 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
GHSA-rcvw-fc36-wjhj

<18.2.8-r3
  • L
GHSA-6mpj-fw9g-9wqm

<18.2.8-r3
  • L
GHSA-p9cp-qq4c-2wr5

<18.2.8-r3
  • L
GHSA-fjj2-x466-w3hx

<18.2.8-r3
  • L
Exposure of Private Information ('Privacy Violation')

<18.2.8-r3
  • M
Cross-site Scripting (XSS)

<18.2.8-r3
  • L
GHSA-c3cp-7jp9-c872

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
Improper Encoding or Escaping of Output

<18.2.8-r3
  • L
GHSA-2jwx-73fx-pwrv

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
Information Exposure

<18.2.8-r3
  • L
Authentication Bypass

<18.2.8-r3
  • L
GHSA-w2j6-r4xj-rjcj

<18.2.8-r3
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r3
  • L
GHSA-p9w7-rqj5-fjh5

<18.2.8-r3
  • L
GHSA-h2vc-rgmf-cp34

<18.2.8-r3
  • L
Insufficient Granularity of Access Control

<18.2.8-r3
  • L
Improper Encoding or Escaping of Output

<18.2.8-r3
  • L
GHSA-rh5v-9jwc-7736

<18.2.8-r3
  • L
Cross-site Scripting (XSS)

<18.2.8-r3
  • L
GHSA-w2m4-xx67-836j

<18.2.8-r3
  • M
Cross-site Scripting (XSS)

<18.2.8-r3
  • M
Missing Authorization

<18.2.8-r3
  • L
GHSA-xgjv-46p6-hwgv

<18.2.8-r3
  • L
GHSA-mfcp-rjv7-385m

<18.2.8-r3
  • L
GHSA-mp63-3qcj-f8c7

<18.2.8-r3
  • L
GHSA-x45w-x744-4hj7

<18.2.8-r3
  • M
Information Exposure Through Log Files

<18.2.8-r3
  • L
GHSA-3cq3-cj5m-hm72

<18.2.8-r3
  • L
GHSA-39m5-rg2v-54h9

<18.2.8-r3
  • L
GHSA-j8j9-23cp-fr5v

<18.2.8-r3
  • L
GHSA-m766-xfqm-qm37

<18.2.8-r3
  • L
GHSA-pv96-f897-xcch

<18.2.8-r3
  • L
GHSA-cpx5-2q84-prc5

<18.2.8-r3
  • L
GHSA-5mh9-3jwc-rp59

<18.2.8-r3
  • L
Improper Certificate Validation

<18.2.8-r3
  • L
Improper Certificate Validation

<18.2.8-r3
  • L
GHSA-7c64-f9jr-v9h2

<18.2.8-r3
  • L
GHSA-rm4r-vwvw-vj67

<18.2.8-r2
  • L
CVE-2025-47914

<18.2.8-r2
  • M
Incorrect Authorization

<18.2.8-r2
  • M
Uncontrolled Memory Allocation

<18.2.8-r2
  • L
GHSA-f6x5-jh6r-wrfv

<18.2.8-r2
  • L
GHSA-7hhv-h469-wc4q

<18.2.8-r2
  • L
CVE-2025-58181

<18.2.8-r2
  • L
GHSA-9mv9-gw4x-7xw4

<18.2.8-r2
  • M
Information Exposure

<18.2.8-r2
  • L
GHSA-j5w8-q4qc-rx2x

<18.2.8-r2
  • L
GHSA-hjx7-fpxx-mj48

<18.2.8-r1
  • L
CVE-2025-47912

<18.2.8-r1
  • L
GHSA-cxq7-xw9v-rcv3

<18.2.8-r1
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r1
  • L
CVE-2025-61725

<18.2.8-r1
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r1
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r1
  • L
CVE-2025-58183

<18.2.8-r1
  • L
GHSA-9gcr-gp5f-jw27

<18.2.8-r1
  • L
GHSA-447v-2qg4-h8hc

<18.2.8-r1
  • L
GHSA-7wwx-xj66-r44x

<18.2.8-r1
  • L
GHSA-jwmf-chvc-rf92

<18.2.8-r1
  • L
GHSA-frhw-mqj2-wxw2

<18.2.8-r1
  • L
Algorithmic Complexity

<18.2.8-r1
  • L
GHSA-wcw9-47fp-rrfr

<18.2.8-r1
  • L
Information Exposure Through Log Files

<18.2.8-r1
  • L
CVE-2025-58186

<18.2.8-r1
  • L
Improper Certificate Validation

<18.2.8-r1
  • L
GHSA-rjcg-56ph-3qvg

<18.2.8-r1
  • L
GHSA-qh38-484v-w52x

<18.2.8-r1