CVE-2022-25858

The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:terser:terser:*:*:*:*:*:node.js:*:*
cpe:2.3:a:terser:terser:*:*:*:*:*:node.js:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-1333

21 Jul 2022, 14:33

Type Values Removed Values Added
References (CONFIRM) https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b - (CONFIRM) https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b - Patch, Third Party Advisory
References (CONFIRM) https://snyk.io/vuln/SNYK-JS-TERSER-2806366 - (CONFIRM) https://snyk.io/vuln/SNYK-JS-TERSER-2806366 - Exploit, Patch, Third Party Advisory
References (CONFIRM) https://github.com/terser/terser/blob/master/lib/compress/evaluate.js%23L135 - (CONFIRM) https://github.com/terser/terser/blob/master/lib/compress/evaluate.js%23L135 - Broken Link
References (CONFIRM) https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722 - (CONFIRM) https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722 - Exploit, Patch, Third Party Advisory
References (CONFIRM) https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012 - (CONFIRM) https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012 - Patch, Third Party Advisory
CPE cpe:2.3:a:terser:terser:*:*:*:*:*:node.js:*:*
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

15 Jul 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-15 20:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-25858

Mitre link : CVE-2022-25858

CVE.ORG link : CVE-2022-25858


JSON object : View

Products Affected

terser

  • terser
CWE
CWE-1333

Inefficient Regular Expression Complexity