Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to cause a denial of service condition due to improper input validation on webhook custom header names under certain conditions.
Published: 2026-03-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

GitLab's Webhook custom header validation contains a flaw that allows an authenticated user to submit requests with specially crafted header names. The improper input handling can cause the system to allocate resources without applying limits or throttling, leading to a denial of service condition. This weakness is identified as CWE-770 and can disrupt service availability for the affected instance.

Affected Systems

All GitLab Community Edition (CE) and Enterprise Edition (EE) deployments from version 16.11 up to but excluding 18.7.6, all 18.8 releases prior to 18.8.6, and all 18.9 releases prior to 18.9.2 are vulnerable. The vulnerability affects the GitLab product as a whole, irrespective of the community or enterprise distribution tags.

Risk and Exploitability

The CVSS profile scores the vulnerability a 6.5, which indicates moderate severity, and the EPSS score is below 1%, implying a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalogue. Exploitation requires authentication, so only users with valid credentials or compromised accounts can trigger the denial of service scenario. While the impact is limited to availability, the moderate severity and low exploitation probability reduce the urgency compared to higher-severity threats, but patching remains the recommended mitigation.

Generated by OpenCVE AI on March 17, 2026 at 14:43 UTC.

Remediation

Vendor Solution

Upgrade to versions 18.7.6, 18.8.6, 18.9.2 or above.


OpenCVE Recommended Actions

  • Upgrade to GitLab versions 18.7.6, 18.8.6, 18.9.2 or newer

Generated by OpenCVE AI on March 17, 2026 at 14:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to cause a denial of service condition due to improper input validation on webhook custom header names under certain conditions.
Title Allocation of Resources Without Limits or Throttling in GitLab
First Time appeared Gitlab
Gitlab gitlab
Weaknesses CWE-770
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
Vendors & Products Gitlab
Gitlab gitlab
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-03-12T16:20:22.100Z

Reserved: 2025-11-25T20:33:21.978Z

Link: CVE-2025-13690

cve-icon Vulnrichment

Updated: 2026-03-12T15:42:35.817Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T16:16:18.877

Modified: 2026-03-13T12:32:53.510

Link: CVE-2025-13690

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:43Z

Weaknesses