Cyber Posture

CVE-2025-14513

High

Published: 11 March 2026

Published
11 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0004 13.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14513 is a high-severity Improper Validation of Specified Quantity in Input (CWE-1284) vulnerability in Gitlab Gitlab. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Unauthenticated remote exploitation of public-facing GitLab API via crafted JSON input directly enables application-layer DoS through software vulnerability abuse.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service condition due to improper input…

more

validation when processing specially crafted JSON payloads in the protected branches API.

Deeper analysisAI

CVE-2025-14513 is a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) that enables an unauthenticated user to trigger a denial of service (DoS) condition. The flaw arises from improper input validation when processing specially crafted JSON payloads submitted to the protected branches API. It impacts all versions from 16.11 prior to 18.7.6, 18.8 prior to 18.8.6, and 18.9 prior to 18.9.2, with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-1284 (Improper Validation of Specified Quantity in Input).

An unauthenticated attacker can exploit this remotely over the network with low attack complexity and no user interaction or privileges needed. By sending a malicious JSON payload to the protected branches API endpoint, the attacker causes a DoS, rendering the service unavailable, while confidentiality and integrity remain unaffected.

GitLab has remediated the issue through patches, including GitLab 18.9.2 as outlined in the patch release notes at https://about.gitlab.com/releases/2026/03/11/patch-release-gitlab-18-9-2-released/. Further technical details are documented in GitLab's internal work item at https://gitlab.com/gitlab-org/gitlab/-/work_items/583718 and the originating HackerOne disclosure report at https://hackerone.com/reports/3452477. Security teams should prioritize upgrading affected instances to patched versions for mitigation.

Details

CWE(s)

Affected Products

gitlab
gitlab
16.11.0 — 18.7.6 · 16.11.0 — 18.7.6 · 18.8.0 — 18.8.6

CVEs Like This One

CVE-2026-1092Same product: Gitlab Gitlab
CVE-2025-12664Same product: Gitlab Gitlab
CVE-2025-14511Same product: Gitlab Gitlab
CVE-2025-13928Same product: Gitlab Gitlab
CVE-2026-1069Same product: Gitlab Gitlab
CVE-2026-1458Same product: Gitlab Gitlab
CVE-2025-13927Same product: Gitlab Gitlab
CVE-2025-1257Same product: Gitlab Gitlab
CVE-2024-9631Same product: Gitlab Gitlab
CVE-2026-1102Same product: Gitlab Gitlab

References