Impact
An authenticated user may trigger a denial of service by exploiting a lack of throttling when the system retrieves notes under certain conditions. The flaw allows the attacker to exhaust processing resources or event queues, potentially halting normal system functionality for all users who depend on that feature.
Affected Systems
GitLab Community Edition and Enterprise Edition, every release from version 9.2 up to and including 18.9.5, 18.10.3, and 18.11.0 are affected. The issue does not apply to newer releases that implement tightened resource limits.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. EPSS data is not available, and the vulnerability is not currently listed in CISA’s KEV catalog. Exploitation requires an authenticated session and specifically targets the note‑retrieval pathway; attackers would need to harness legitimate access to trigger the resource exhaustion.
OpenCVE Enrichment