Impact
GitLab versions from 13.7 up to 18.10.0 contain a flaw that allows an authenticated user to trigger excessive resource consumption during CI processing. The vulnerability originates from unbounded allocation of resources when handling specific CI inputs, which can exhaust memory or CPU and ultimately render the service unavailable. The weakness is identified as CWE‑770, Resource Exhaustion.
Affected Systems
All GitLab Community Edition and Enterprise Edition deployments from version 13.7 through 18.10.0 are affected. Users should ensure their installations are at least 18.8.7, 18.9.3, or 18.10.1 or newer to receive the remediation fix. No further granularity is listed beyond the major product line.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity; combined with an EPSS of less than 1 percent, the likelihood of exploitation in the wild is low. The vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread attacks. Exploitation requires authenticated access to the platform, so internal users with pipeline or job-create permissions pose the primary threat vector. Once exploited, the attacker can cause a denial of service that affects all users on the affected instance.
OpenCVE Enrichment