Vulnerability Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service condition due to improper input validation when processing specially crafted JSON payloads in the protected branches API.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 16.11.0, < 18.7.6 |
Related Weaknesses (CWE)
References
- https://about.gitlab.com/releases/2026/03/11/patch-release-gitlab-18-9-2-releaseRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/work_items/583718Broken Link
- https://hackerone.com/reports/3452477Permissions Required
FAQ
What is CVE-2025-14513?
CVE-2025-14513 is a vulnerability with a CVSS score of 7.5 (HIGH). GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a de...
How severe is CVE-2025-14513?
CVE-2025-14513 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-14513?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.