Subscribe

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

GitLab and Atlassian Fix High-Severity Security Bugs

GitLab and Atlassian Fix High-Severity Security Bugs GitLab and Atlassian Fix High-Severity Security Bugs
IMAGE CREDITS: OSIBEYOND

This week, GitLab and Atlassian released urgent patches addressing more than a dozen vulnerabilities across their platforms, several of which are rated high severity and could pose serious security risks if left unaddressed.

Atlassian Fixes Six Critical Flaws in Popular Tools

On Tuesday, Atlassian issued eight separate security advisories revealing six high-severity vulnerabilities discovered in Bamboo, Confluence, Fisheye/Crucible, and Jira. These bugs originate from third-party components integrated into the platforms and, if exploited, could lead to denial-of-service (DoS) attacks or privilege escalation.

The company strongly recommends that users upgrade to the latest product versions to eliminate all known vulnerabilities. No signs of active exploitation have been reported, but the nature of the flaws makes patching critical for system integrity and user protection.

GitLab Addresses High-Severity DoS Risk and More

GitLab followed up on Wednesday with its own round of updates, releasing fixes for 10 vulnerabilities in both its Community Edition (CE) and Enterprise Edition (EE). Among them, CVE-2025-0993 stands out as the most severe—an issue that allows authenticated users to crash servers by overwhelming system resources.

The update also resolves seven medium-severity issues, including bugs that could bypass two-factor authentication, expose confidential CI variables, and reveal full user email addresses. Additionally, two low-severity bugs—branch name misidentification and unauthorized access to job data—were corrected.

These fixes have been rolled out in GitLab versions 17.10.7, 17.11.3, and 18.0.1. The company urges all users to apply the latest updates without delay, although it confirmed that none of the vulnerabilities appear to have been exploited in the wild.

Share with others