diff --git a/docs/advisories/20250110001-GitLab-Critical-Updates-Advisory.md b/docs/advisories/20250110001-GitLab-Critical-Updates-Advisory.md
new file mode 100644
index 00000000..b37155c4
--- /dev/null
+++ b/docs/advisories/20250110001-GitLab-Critical-Updates-Advisory.md
@@ -0,0 +1,25 @@
+# GitLab Releases Critical Updates - 20250110001
+
+## Overview
+
+GitLab has released critical updates for their GitLab Community Edition(CE) and GitLab Enterprise Edition (EE) products. Successful exploitation could allow an attacker trigger a pipeline as another user under certain circumstances.
+
+## What is vulnerable?
+
+| Product(s) Affected | Versions(s) | CVE | Severity | CVSS |
+| ------------------- | ----------- | ---- | ------------ | ---- |
+| GitLab CE/EE | - 15.8 < 16.11.5
- 17.6 < 17.6.3
- 17.7 < 17.7.1 | [CVE-2024-5655](https://nvd.nist.gov/vuln/detail/CVE-2024-5655) | 9.6 | **Critical** |
+| GitLab CE/EE | - 15.8 < 16.11.6
- 17.0 < 17.0.4
- 17.1 < 17.1.2 | [CVE-2024-6385](https://nvd.nist.gov/vuln/detail/CVE-2024-6385) | 9.6 | **Critical** |
+| GitLab CE/EE | - 8.14 < 17.1.7
- 17.2 < 17.2.5
- 17.3 < 17.3.2 | [CVE-2024-6678](https://nvd.nist.gov/vuln/detail/CVE-2024-6678) | 9.9 | **Critical** |
+| GitLab CE/EE | - 11.6 < 17.2.9
- 17.3 < 17.3.5
- 17.4 < 17.4.2 | [CVE-2024-8970](https://nvd.nist.gov/vuln/detail/CVE-2024-8970) | 8.2 | High |
+
+
+## Recommendation
+
+The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):
+
+- GitLab Security Release:
+
+## Additional References
+
+- SecurityOnline: