JustAppSec
Back to news

Patches unauthenticated GraphQL DoS in GitLab CE/EE

2 min readPublished 08 Apr 2026Source: GitLab Releases

TL;DR — GitLab fixed a High-severity unauthenticated DoS where repeated GraphQL queries can make GitLab instances unresponsive; self-managed teams should prioritize upgrading to patched patch releases.

What happened

GitLab is a DevSecOps platform used for source control, CI/CD, and security scanning in a single application. In its April 8, 2026 patch release, GitLab disclosed and remediated CVE-2025-12664: an issue where an unauthenticated user can cause denial of service by sending repeated GraphQL queries.

ItemSource value
Affected softwareGitLab Community Edition (CE) / Enterprise Edition (EE)
Impact (per source)Unauthenticated denial of service by sending repeated GraphQL queries
SeverityCVSS 7.5 (High), CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impacted versionsGitLab CE/EE: all versions from 13.0 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3
Patched versions18.8.9, 18.9.5, 18.10.3

GraphQL endpoints are commonly internet-reachable in self-managed GitLab deployments (directly or via an ingress/proxy). Availability bugs in API query execution are a recurring incident class for platform teams because they’re easy to trigger at scale and hard to distinguish from “legitimate” traffic spikes.

Who is impacted

  • Self-managed GitLab CE/EE installations in the impacted version ranges (13.0+ prior to the patched patch releases listed above).
  • Any deployment where the GitLab GraphQL API is reachable by untrusted clients (e.g., internet-exposed, partner-accessible, or broadly accessible internal networks), since the issue is described as unauthenticated.

What to do now

  • Follow vendor remediation guidance and upgrade to a patched release.

    "These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to one of these versions immediately."

  • Prioritize patching externally reachable GitLab instances first (or those reachable by large internal populations), since the weakness is exploitable without authentication.
  • Treat this primarily as an availability risk: review edge controls (WAF/API gateway rules, rate limits, request body limits) around GitLab endpoints that service GraphQL requests to reduce blast radius during rollout.
  • Validate hosting context:

    "GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action."


Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.