CVE-2026-0958
Denial of Service via JSON Validation Bypass in GitLab
Publication date: 2026-02-11
Last updated on: 2026-02-13
Assigner: GitLab Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab | From 18.7.0 (inc) to 18.7.4 (exc) |
| gitlab | gitlab | From 18.8.0 (inc) to 18.8.4 (exc) |
| gitlab | gitlab | From 18.7.0 (inc) to 18.7.4 (exc) |
| gitlab | gitlab | From 18.8.0 (inc) to 18.8.4 (exc) |
| gitlab | gitlab | From 18.4.0 (inc) to 18.6.6 (exc) |
| gitlab | gitlab | From 18.4.0 (inc) to 18.6.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-436 | Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in GitLab CE/EE affects versions from 18.4 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4. It allows an unauthenticated user to bypass JSON validation middleware limits, which can lead to denial of service by exhausting memory or CPU resources.
How can this vulnerability impact me? :
The impact of this vulnerability is a denial of service condition. An attacker who is not authenticated can exploit it to consume excessive memory or CPU resources on the affected GitLab server, potentially causing the service to become unavailable.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade GitLab CE/EE to a fixed version. Specifically, update to version 18.6.6 or later if you are using the 18.4 to 18.6 series, version 18.7.4 or later if you are using the 18.7 series, or version 18.8.4 or later if you are using the 18.8 series.