GitLab CVE-2025-2256: Brief Summary of SAML DoS Vulnerability and Affected Versions

A brief summary of CVE-2025-2256, a denial of service vulnerability in GitLab CE and EE SAML authentication affecting versions 7.12 through 18.1.5, 18.2.0 through 18.2.5, and 18.3.0 through 18.3.1. Includes technical details, affected versions, and references to official advisories.
CVE Analysis

8 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-09-11

GitLab CVE-2025-2256: Brief Summary of SAML DoS Vulnerability and Affected Versions
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Development teams relying on GitLab for source code management and CI/CD could face total service disruption from a single network-based attack. CVE-2025-2256 allows any external actor to send multiple large SAML responses, making affected GitLab instances unresponsive to all legitimate users.

About GitLab: GitLab is a widely adopted DevSecOps platform with millions of users worldwide. It powers source code management, CI/CD, and project collaboration for organizations of all sizes. Both Community Edition (CE) and Enterprise Edition (EE) are used across industries, making vulnerabilities in GitLab highly impactful for the global technology ecosystem.

Technical Information

CVE-2025-2256 is a denial of service vulnerability in the SAML authentication flow of GitLab CE and EE. The vulnerability is rooted in improper validation of the size and concurrency of SAML responses (CWE-1284: Improper Validation of Specified Quantity in Input).

Mechanism:

  • An attacker sends multiple concurrent SAML authentication requests with excessively large SAML responses to the GitLab SAML endpoint.
  • GitLab fails to properly validate or limit the size and number of these incoming SAML responses.
  • The authentication subsystem becomes overwhelmed, consuming excessive CPU and memory resources.
  • This leads to resource exhaustion, causing the instance to become unresponsive to all users.

Key technical points:

  • No authentication is required to exploit this issue.
  • The attack can be launched remotely against any GitLab instance with SAML authentication enabled.
  • The vulnerability affects both Community and Enterprise Editions.
  • Discovered and responsibly disclosed by yuki_osaki via HackerOne.

Affected Systems and Versions

  • GitLab Community Edition (CE) and Enterprise Edition (EE)
  • All versions from 7.12 before 18.1.6
  • 18.2 before 18.2.6
  • 18.3 before 18.3.2
  • Any deployment with SAML authentication enabled is vulnerable

Vendor Security History

GitLab has previously patched critical vulnerabilities in authentication, including SAML-related flaws (e.g., CVE-2024-45409, CVE-2025-25291, CVE-2025-25292). The vendor maintains a monthly release cycle and a public bug bounty program. Their response to critical vulnerabilities is typically prompt, with coordinated advisories and patches across supported versions.

References

Related Articles

Axxon One CVE-2025-10226: Brief Summary of PostgreSQL Dependency Vulnerability and Impact
CVE Analysis

2025-09-10

11 min read

Axxon One CVE-2025-10226: Brief Summary of PostgreSQL Dependency Vulnerability and Impact

This post provides a brief summary of CVE-2025-10226, a critical vulnerability in AxxonSoft Axxon One 2.0.8 and earlier due to dependency on PostgreSQL v10.x. The flaw allows remote attackers to escalate privileges, execute arbitrary code, or cause denial of service by exploiting multiple known CVEs in PostgreSQL, resolved in version 17.4. Includes technical details, affected versions, and vendor security history.

ZeroPath CVE Analysis

ZeroPath CVE Analysis

Cisco IOS XR ARP Storm DoS (CVE-2025-20340): Brief Summary and Technical Details
CVE Analysis

2025-09-10

7 min read

Cisco IOS XR ARP Storm DoS (CVE-2025-20340): Brief Summary and Technical Details

Brief summary of CVE-2025-20340: a high-severity ARP storm vulnerability in Cisco IOS XR Software that can allow an unauthenticated adjacent attacker to cause a denial of service via broadcast storm. This post covers technical details, affected versions, and vendor security history based on available sources.

ZeroPath CVE Analysis

ZeroPath CVE Analysis

Sophos AP6 Series CVE-2025-10159: Brief Summary of a Critical Authentication Bypass Vulnerability
CVE Analysis

2025-09-09

7 min read

Sophos AP6 Series CVE-2025-10159: Brief Summary of a Critical Authentication Bypass Vulnerability

This post provides a brief summary of CVE-2025-10159, a critical authentication bypass vulnerability in Sophos AP6 Series Wireless Access Points prior to firmware version 1.7.2563. The flaw allows remote attackers to gain administrative privileges without credentials. Details include affected versions, technical root cause, and vendor history.

ZeroPath CVE Analysis

ZeroPath CVE Analysis

Detect & fix
what others miss