Cyber Posture

CVE-2026-0958

High

Published: 11 February 2026

Published
11 February 2026
Modified
13 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0004 10.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0958 is a high-severity Interpretation Conflict (CWE-436) vulnerability in Gitlab Gitlab. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 10.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Direct application-layer resource exhaustion via middleware bypass in a public-facing service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through memory or CPU exhaustion by…

more

bypassing JSON validation middleware limits.

Deeper analysisAI

CVE-2026-0958 is a denial-of-service vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE), affecting all versions from 18.4 prior to 18.6.6, 18.7 prior to 18.7.4, and 18.8 prior to 18.8.4. The issue stems from a bypass of JSON validation middleware limits, enabling memory or CPU exhaustion. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-436 (Interpretation Conflict).

An unauthenticated attacker with network access can exploit this vulnerability by sending crafted requests that evade the JSON size or complexity limits enforced by the middleware. Successful exploitation leads to resource exhaustion, causing denial of service through high memory or CPU usage on the affected GitLab instance, with no impact on confidentiality or integrity.

GitLab has remediated the vulnerability in patch releases, including GitLab 18.8.4, as detailed in the official release notes. Security practitioners should upgrade to GitLab 18.6.6, 18.7.4, or 18.8.4 or later versions. Additional details are available in the GitLab issue tracker (gitlab.com/gitlab-org/gitlab/-/issues/586202) and the corresponding HackerOne disclosure (hackerone.com/reports/3463363).

Details

CWE(s)

Affected Products

gitlab
gitlab
18.4.0 — 18.6.6 · 18.4.0 — 18.6.6 · 18.7.0 — 18.7.4

CVEs Like This One

CVE-2026-1388Same product: Gitlab Gitlab
CVE-2025-12664Same product: Gitlab Gitlab
CVE-2026-1725Same product: Gitlab Gitlab
CVE-2026-3988Same product: Gitlab Gitlab
CVE-2025-14511Same product: Gitlab Gitlab
CVE-2026-1092Same product: Gitlab Gitlab
CVE-2025-13927Same product: Gitlab Gitlab
CVE-2025-13928Same product: Gitlab Gitlab
CVE-2024-9631Same product: Gitlab Gitlab
CVE-2025-14513Same product: Gitlab Gitlab

References