GitLab Inc [1] [4], a widely used source code management platform, has released patches for several vulnerabilities [1] [5], including a critical security flaw known as CVE-2024-0402 [2]. This flaw poses a high risk to the server as it allows authenticated users to write files to arbitrary locations, potentially leading to the delivery of malware and unauthorized access to sensitive data.


GitLab has addressed the critical vulnerability, which has a CVSS score of 9.9 out of 10 [2] [6], in versions 16.5.8, 16.6.6, 16.7.4 [1] [2] [4], and 16.8.1 of GitLab Community Edition (CE) and Enterprise Edition (EE). It is important to note that version 16.8.1 specifically contains the patch for CVE-2024-0402 [1]. The patched version has already been implemented in GitLabcom and GitLab Dedicated environments.

In addition to the critical flaw, GitLab has also resolved four medium-severity vulnerabilities [3]. These include regular expression denial-of-service [3], HTML injection [3], and disclosure of a user’s public email address [3]. These updates come after the company addressed two critical shortcomings in a previous release [3].


To mitigate potential risks [3], users are strongly advised to upgrade to the patched version [3]. By doing so, they can protect their servers from compromise and potential unauthorized access to sensitive data. It is crucial to stay vigilant and promptly apply security patches to ensure the ongoing security of the GitLab platform.