{"id":"CVE-2025-0605","summary":"Weak Authentication in GitLab","details":"An issue has been discovered in GitLab CE/EE affecting all versions from 16.8 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Group access controls could allow certain users to bypass two-factor authentication requirements.","aliases":["BIT-gitlab-2025-0605"],"modified":"2026-04-10T05:20:18.570835Z","published":"2025-05-22T14:31:54.105Z","database_specific":{"cna_assigner":"GitLab","cwe_ids":["CWE-1390"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/0xxx/CVE-2025-0605.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/0xxx/CVE-2025-0605.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0605"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/514204"},{"type":"REPORT","url":"https://hackerone.com/reports/2919391"},{"type":"PACKAGE","url":"git://git@gitlab.com:gitlab-org/gitlab.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"1e912d57d5a8f1135f4d41e25469069790134d41"},{"fixed":"f0dceea5a8da8be1e1ba3cd326488dc7ff2937b7"}],"database_specific":{"versions":[{"introduced":"16.8"},{"fixed":"17.10.7"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"b7c061ce59a5eca5c5764fcf61be8a5103fb7d55"},{"fixed":"04504205b2b2eea62727ecbe96dae84f99cb24cf"}],"database_specific":{"versions":[{"introduced":"17.11"},{"fixed":"17.11.3"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"504fd9e5236e13d674e051c6b8a1e9892b371c58"},{"fixed":"3426be1b93852c5358240c5df40970c0ddfbdb2a"}],"database_specific":{"versions":[{"introduced":"18.0"},{"fixed":"18.0.1"}]}}],"versions":["v17.11.0-ee","v18.0.0-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-0605.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}]}