PatchSiren cyber security CVE debrief
CVE-2025-14870 Hackerone CVE debrief
GitLab remediated a high-severity denial-of-service issue in GitLab CE/EE that could be triggered by an unauthenticated attacker sending specially crafted JSON payloads. Affected releases include 18.5 before 18.9.7, 18.10 before 18.10.6, and 18.11 before 18.11.3.
- Vendor
- Hackerone
- Product
- Unknown
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-14
- Original CVE updated
- 2026-05-14
- Advisory published
- 2026-05-14
- Advisory updated
- 2026-05-14
Who should care
GitLab CE/EE administrators, DevOps and platform teams, and security owners running vulnerable 18.5-18.9.6, 18.10-18.10.5, or 18.11-18.11.2 instances, especially if GitLab is internet-facing or operationally critical.
Technical summary
According to the supplied advisory data, the flaw is an input-validation weakness that allows unauthenticated remote denial of service through specially crafted JSON. The CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network reachability, no privileges, and high availability impact.
Defensive priority
High. This is unauthenticated, network-reachable, and can disrupt service availability; patching affected GitLab instances should be prioritized.
Recommended defensive actions
- Upgrade GitLab CE/EE to 18.9.7, 18.10.6, or 18.11.3, or a later supported release on the same stable branch.
- Confirm all self-managed GitLab deployments are on unaffected versions, including test and staging environments.
- Temporarily restrict access to GitLab to trusted networks or users if immediate upgrading is not possible.
- Monitor for unusual request failures, 5xx spikes, crashes, or service restarts while patching.
- Review the linked GitLab advisory and release notes to align the upgrade with your standard maintenance process.
Evidence notes
The version ranges, fixed versions, CVSS vector, CWE-770 mapping, and impact summary come from the supplied GitHub Advisory Database entry for GHSA-97r5-5fr5-p642 and its referenced CVE/NVD metadata. The advisory references the HackerOne report, GitLab patch release page, and GitLab work item; no exploit details beyond 'specially crafted JSON payloads' are included here.
Official resources
-
CVE-2025-14870 CVE record
CVE.org
-
CVE-2025-14870 NVD detail
NVD
-
Source item URL
github_advisory_database
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the advisory record on 2026-05-14, with the linked GitLab patch release dated 2026-05-13.