Improper XPath Validation in GitLab CE/EE Affects Multiple Versions
CVE-2024-12093

6.8MEDIUM

Key Information:

Vendor

Gitlab

Status
Vendor
CVE Published:
22 May 2025

What is CVE-2024-12093?

A vulnerability in GitLab CE/EE has been identified where improper XPath validation could allow a modified SAML response to bypass the two-factor authentication (2FA) requirement under certain conditions. This issue affects various versions of the software, creating a potential risk for unauthorized access. Users are advised to ensure that they are running a secure version and follow best practices for authentication processes.

Affected Version(s)

GitLab 11.1 < 17.10.7

GitLab 17.11 < 17.11.3

GitLab 18.0 < 18.0.1

References

CVSS V3.1

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program
.
CVE-2024-12093 : Improper XPath Validation in GitLab CE/EE Affects Multiple Versions