Impact
This vulnerability is an improper neutralization of special elements used in the template engine of GitLab AI Gateway. User supplied data in Duo Agent Platform Flow definitions is insecurely expanded, which can lead to denial of service or execution of arbitrary code on the gateway. The weakness is classified as CWE-1336, indicating a template injection flaw that compromises code integrity and confidentiality.
Affected Systems
The affected product is GitLab AI Gateway. All self‑hosted versions from 18.1.6, 18.2.6, 18.3.1 up to and including 18.6.1, 18.7.0, and 18.8.0 are vulnerable. The issue is tracked under the CPE for GitLab AI Gateway and is fixed in releases 18.6.2, 18.7.1, and 18.8.1 or newer.
Risk and Exploitability
The CVSS score is 9.9, denoting critical severity. The EPSS score is under 1 %, indicating the likelihood of exploitation is very low at present. It is not listed in the CISA KEV catalog. Based on the description, the attack likely requires an attacker to supply a crafted Duo Workflow definition to the gateway, enabling insecure template expansion. The attack vector appears to be remote via the gateway's API or administrative interface, though the exact path is not explicitly detailed.
OpenCVE Enrichment