CVE-2025-7337
GitLab vulnerability analysis and mitigation

Overview

An issue has been discovered in GitLab CE/EE affecting all versions from 7.8 before 18.1.6, 18.2 before 18.2.6, and 18.3 before 18.3.2. The vulnerability (CVE-2025-7337) allows an authenticated user with Developer-level access to cause a persistent denial of service affecting all users on a GitLab instance by uploading large files. This medium-severity vulnerability was discovered through GitLab's HackerOne bug bounty program by researcher pwnie (GitLab Release).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U), with no impact on confidentiality (C:N) or integrity (I:N), but high impact on availability (A:H). The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling) (NVD).

Impact

When exploited, this vulnerability can cause a persistent denial of service condition that affects all users on a GitLab instance. The impact is specifically focused on system availability, with no direct effect on data confidentiality or integrity. The persistent nature of the denial of service suggests that the system remains unavailable until administrative intervention is performed (GitLab Release).

Mitigation and workarounds

GitLab has released patches to address this vulnerability in versions 18.3.2, 18.2.6, and 18.1.6 for both Community Edition (CE) and Enterprise Edition (EE). Organizations are strongly recommended to upgrade to these patched versions immediately. GitLab.com is already running the patched version, and GitLab Dedicated customers do not need to take any action as their instances are automatically updated (GitLab Release).

Additional resources


SourceThis report was generated using AI

Related GitLab vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-6454HIGH8.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesSep 12, 2025
CVE-2025-2256HIGH7.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesSep 12, 2025
CVE-2025-7337MEDIUM6.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesSep 12, 2025
CVE-2025-1250MEDIUM6.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesSep 12, 2025
CVE-2025-6769MEDIUM4.3
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesSep 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management