FKIE_CVE-2026-1456
Vulnerability from fkie_nvd - Published: 2026-02-11 12:16 - Updated: 2026-02-12 21:39
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through CPU exhaustion by submitting specially crafted markdown files that trigger exponential processing in markdown preview.
References
| URL | Tags | ||
|---|---|---|---|
| cve@gitlab.com | https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released/ | Release Notes, Vendor Advisory | |
| cve@gitlab.com | https://gitlab.com/gitlab-org/gitlab/-/issues/587688 | Broken Link, Issue Tracking | |
| cve@gitlab.com | https://hackerone.com/reports/3517928 | Permissions Required |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "EB4484C1-2D91-48A6-B396-4F16DC598828",
"versionEndExcluding": "18.7.4",
"versionStartIncluding": "18.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "DA7B13F4-05B9-436E-A1DC-6C65DB7B44FE",
"versionEndExcluding": "18.7.4",
"versionStartIncluding": "18.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "BCEB62DB-0D85-4A21-99C4-6235CA97A795",
"versionEndExcluding": "18.8.4",
"versionStartIncluding": "18.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "6D01D64A-0619-427D-B351-4101FC257674",
"versionEndExcluding": "18.8.4",
"versionStartIncluding": "18.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through CPU exhaustion by submitting specially crafted markdown files that trigger exponential processing in markdown preview."
},
{
"lang": "es",
"value": "GitLab ha remediado un problema en GitLab CE/EE que afectaba a todas las versiones desde la 18.7 hasta las anteriores a la 18.7.4, y desde la 18.8 hasta las anteriores a la 18.8.4, que podr\u00eda haber permitido a un usuario no autenticado causar denegaci\u00f3n de servicio mediante el agotamiento de la CPU al enviar archivos markdown especialmente dise\u00f1ados que desencadenan un procesamiento exponencial en la vista previa de markdown."
}
],
"id": "CVE-2026-1456",
"lastModified": "2026-02-12T21:39:23.503",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "cve@gitlab.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-02-11T12:16:04.703",
"references": [
{
"source": "cve@gitlab.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released/"
},
{
"source": "cve@gitlab.com",
"tags": [
"Broken Link",
"Issue Tracking"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/587688"
},
{
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/3517928"
}
],
"sourceIdentifier": "cve@gitlab.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "cve@gitlab.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…