Cyber Posture

CVE-2025-13928

High

Published: 22 January 2026

Published
22 January 2026
Modified
26 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0001 1.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13928 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Gitlab Gitlab. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 1.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-863

Periodic review and update of procedures reduces incorrect authorization implementations over time.

addresses: CWE-863

Supervision identifies cases where authorization logic incorrectly permits unauthorized actions.

addresses: CWE-863

Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.

addresses: CWE-863

The authorization process and usage restrictions help prevent incorrect authorization for remote access types.

addresses: CWE-863

Establishing configuration and connection requirements helps ensure correct rather than incorrect authorization for wireless access.

addresses: CWE-863

Establishing connection authorization processes for mobile devices helps ensure authorization decisions are correctly implemented rather than incorrect.

addresses: CWE-863

Monitoring account use, notifying on changes, and reviewing accounts for compliance corrects incorrect authorization assignments.

addresses: CWE-863

Ensures authorization decisions for external system use are correctly implemented and enforced.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Unauthenticated network exploitation of public GitLab API endpoints (incorrect authz) directly enables T1190 for initial access and T1499.004 for resulting application DoS via crafted requests.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 that could have allowed an unauthenticated user to cause a denial of service condition by exploiting incorrect authorization…

more

validation in API endpoints.

Deeper analysisAI

CVE-2025-13928 is a denial-of-service vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE), stemming from incorrect authorization validation in API endpoints (CWE-863). It affects all versions from 17.7 prior to 18.6.4, 18.7 prior to 18.7.2, and 18.8 prior to 18.8.2. The issue has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity due to its network accessibility and lack of prerequisites.

An unauthenticated attacker can exploit this vulnerability over the network with low complexity, sending crafted requests to vulnerable API endpoints. Successful exploitation results in a denial-of-service condition, disrupting service availability without impacting confidentiality or integrity.

GitLab has remediated the issue through patch releases, including GitLab 18.8.2, as detailed in their release notes. Security practitioners should upgrade affected instances to one of the fixed versions (18.6.4, 18.7.2, or 18.8.2). Additional details are available in the GitLab issue tracker (gitlab.com/gitlab-org/gitlab/-/issues/582736) and the originating HackerOne report (hackerone.com/reports/3439441).

Details

CWE(s)

Affected Products

gitlab
gitlab
17.7.0 — 18.6.4 · 17.7.0 — 18.6.4 · 18.7.0 — 18.7.2

CVEs Like This One

CVE-2026-1092Same product: Gitlab Gitlab
CVE-2025-14513Same product: Gitlab Gitlab
CVE-2026-1069Same product: Gitlab Gitlab
CVE-2026-1458Same product: Gitlab Gitlab
CVE-2025-2242Same product: Gitlab Gitlab
CVE-2025-13927Same product: Gitlab Gitlab
CVE-2025-1257Same product: Gitlab Gitlab
CVE-2024-9631Same product: Gitlab Gitlab
CVE-2026-1102Same product: Gitlab Gitlab
CVE-2025-13929Same product: Gitlab Gitlab

References