7.5

CVE-2026-1388

Exploit
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 9.2 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 that could have allowed an unauthenticated user to cause regular expression denial of service by sending specially crafted input to a merge request endpoint under certain conditions.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GitlabGitLab SwEditioncommunity Version >= 9.2.0 < 18.7.5
GitlabGitLab SwEditionenterprise Version >= 9.2.0 < 18.7.5
GitlabGitLab SwEditioncommunity Version >= 18.8.0 < 18.8.5
GitlabGitLab SwEditionenterprise Version >= 18.8.0 < 18.8.5
GitlabGitLab Version18.9.0 SwEditioncommunity
GitlabGitLab Version18.9.0 SwEditionenterprise
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.135
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cve@gitlab.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-1333 Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.