Home

Description

An issue has been discovered in GitLab CE/EE affecting all versions from 7.12 before 18.1.6, 18.2 before 18.2.6, and 18.3 before 18.3.2 that could have allowed unauthorized users to render the GitLab instance unresponsive to legitimate users by sending multiple concurrent large SAML responses.

PUBLISHED Reserved 2025-03-12 | Published 2025-09-12 | Updated 2025-09-12 | Assigner GitLab




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-1284: Improper Validation of Specified Quantity in Input

Product status

Default status
unaffected

7.12 (semver) before 18.1.6
affected

18.2 (semver) before 18.2.6
affected

18.3 (semver) before 18.3.2
affected

Credits

Thanks [yuki_osaki](https://hackerone.com/yuki_osaki) and [lambdasawa](https://hackerone.com/lambdasawa) for reporting this vulnerability through our HackerOne bug bounty program finder

References

about.gitlab.com/...10/patch-release-gitlab-18-3-2-released/

gitlab.com/gitlab-org/gitlab/-/issues/524633 (GitLab Issue #524633) issue-tracking permissions-required

hackerone.com/reports/3019485 (HackerOne Bug Bounty Report #3019485) technical-description exploit permissions-required

cve.org (CVE-2025-2256)

nvd.nist.gov (CVE-2025-2256)

Download JSON