CVE-2025-3601
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-08-27
Last updated on: 2025-09-02
Assigner: GitLab Inc.
Description
Description
An issue has been discovered in GitLab CE/EE affecting all versions from 8.15 before 18.1.5, 18.2 before 18.2.5, and 18.3 before 18.3.1 that could have could have allowed an authenticated user to cause a Denial of Service (DoS) condition by submitting URLs that generate excessively large responses.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab | From 8.15.0 (inc) to 18.1.5 (exc) |
| gitlab | gitlab | From 8.15.0 (inc) to 18.1.5 (exc) |
| gitlab | gitlab | From 18.2.0 (inc) to 18.2.5 (exc) |
| gitlab | gitlab | From 18.2.0 (inc) to 18.2.5 (exc) |
| gitlab | gitlab | 18.3.0 |
| gitlab | gitlab | 18.3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in GitLab CE/EE allows an authenticated user to cause a Denial of Service (DoS) condition by submitting URLs that generate excessively large responses, affecting versions from 8.15 before 18.1.5, 18.2 before 18.2.5, and 18.3 before 18.3.1.
How can this vulnerability impact me? :
The impact of this vulnerability is a Denial of Service (DoS) condition, which means the affected GitLab service could become unavailable or unresponsive due to resource exhaustion caused by processing excessively large responses triggered by malicious URLs.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70