CVE-2025-2937
GitLab vulnerability analysis and mitigation

Overview

An issue has been discovered in GitLab CE/EE affecting all versions from 13.2 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed authenticated users to create a denial of service condition by sending specially crafted markdown payloads to the Wiki feature. The vulnerability was assigned CVE-2025-2937 and was discovered through GitLab's HackerOne bug bounty program (GitLab Patch).

Technical details

The vulnerability is classified as an Inefficient Regular Expression Complexity issue affecting the Wiki feature in GitLab. It has been assigned a CVSS v3.1 score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The weakness is categorized under CWE-1333 (Inefficient Regular Expression Complexity) (NVD Database, GitLab Patch).

Impact

The vulnerability could allow authenticated users to create a denial of service condition in the GitLab instance by sending specially crafted markdown payloads to the Wiki feature. This could potentially affect the availability of the GitLab service for other users (GitLab Patch).

Mitigation and workarounds

GitLab has released patches to address this vulnerability in versions 18.0.6, 18.1.4, and 18.2.2. It is strongly recommended that all affected installations be upgraded to the latest patched version immediately. GitLab.com is already running the patched version, and GitLab Dedicated customers do not need to take action (GitLab Patch).

Community reactions

The vulnerability was discovered and reported through GitLab's HackerOne bug bounty program by researcher yuki_osaki. The discovery and patching process followed GitLab's standard security practices, with the vulnerability being addressed in a scheduled security release (GitLab Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management