Information Exposure Affecting gitlab-rails-ce-18.2 package, versions <18.2.8-r1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-GITLABRAILSCE182-14097282
  • published22 Nov 2025
  • disclosed15 Nov 2025

Introduced: 15 Nov 2025

NewCVE-2025-2615  (opens in a new tab)
CWE-201  (opens in a new tab)

How to fix?

Upgrade Chainguard gitlab-rails-ce-18.2 to version 18.2.8-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gitlab-rails-ce-18.2 package and not the gitlab-rails-ce-18.2 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.7 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2, that could have allowed a blocked user to access sensitive information by establishing GraphQL subscriptions through WebSocket connections.

CVSS Base Scores

version 3.1