CVE-2026-0958
📋 TL;DR
This vulnerability allows unauthenticated attackers to cause denial of service on GitLab instances by bypassing JSON validation middleware limits, leading to memory or CPU exhaustion. It affects all GitLab Community Edition and Enterprise Edition installations running vulnerable versions. The attack requires no authentication and can render GitLab services unavailable.
💻 Affected Systems
- GitLab Community Edition
- GitLab Enterprise Edition
📦 What is this software?
Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →⚠️ Risk & Real-World Impact
Worst Case
Complete service unavailability due to resource exhaustion, potentially affecting all GitLab services including repositories, CI/CD pipelines, and user authentication.
Likely Case
Partial or intermittent service degradation affecting GitLab performance and availability for users.
If Mitigated
Minimal impact with proper rate limiting, resource monitoring, and network segmentation in place.
🎯 Exploit Status
The vulnerability involves bypassing JSON validation limits which is relatively straightforward to exploit once the technique is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 18.6.6, 18.7.4, or 18.8.4
Vendor Advisory: https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released/
Restart Required: Yes
Instructions:
1. Backup your GitLab instance. 2. Update to GitLab 18.6.6, 18.7.4, or 18.8.4 depending on your current version. 3. Restart GitLab services. 4. Verify the update was successful.
🔧 Temporary Workarounds
Rate Limiting Configuration
allImplement strict rate limiting on JSON endpoints to prevent abuse
Configure nginx or load balancer rate limiting for GitLab endpoints
Network Access Control
allRestrict access to GitLab instance to trusted networks only
Configure firewall rules to limit GitLab access
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to detect and block JSON payload abuse
- Monitor system resources closely and implement automated alerts for abnormal CPU/memory usage
🔍 How to Verify
Check if Vulnerable:
Check GitLab version via admin panel or command line. If version is between 18.4-18.6.5, 18.7-18.7.3, or 18.8-18.8.3, the system is vulnerable.
Check Version:
sudo gitlab-rake gitlab:env:info | grep Version
Verify Fix Applied:
Verify GitLab version is 18.6.6, 18.7.4, or 18.8.4 or higher. Test JSON endpoint functionality remains normal.
📡 Detection & Monitoring
Log Indicators:
- Abnormally large JSON payloads in logs
- Repeated failed JSON validation attempts
- High resource usage alerts
Network Indicators:
- Unusual traffic patterns to JSON endpoints
- Multiple requests with malformed JSON from single sources
SIEM Query:
source="gitlab" AND ("JSON validation" OR "payload too large") AND severity=ERROR