6.5

CVE-2025-2937

Exploit

Inefficient Regular Expression Complexity in GitLab

An issue has been discovered in GitLab CE/EE affecting all versions from 13.2 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed authenticated users to create a denial of service condition by sending specially crafted markdown payloads to the Wiki feature.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GitlabGitLab SwEditioncommunity Version >= 13.2.0 < 18.0.6
GitlabGitLab SwEditionenterprise Version >= 13.2.0 < 18.0.6
GitlabGitLab SwEditioncommunity Version >= 18.1.0 < 18.1.4
GitlabGitLab SwEditionenterprise Version >= 18.1.0 < 18.1.4
GitlabGitLab SwEditioncommunity Version >= 18.2.0 < 18.2.2
GitlabGitLab SwEditionenterprise Version >= 18.2.0 < 18.2.2
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.245
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cve@gitlab.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-1333 Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.