Vulnerability Details : CVE-2022-25927
Potential exploit
Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function.
Vulnerability category: Denial of service
Products affected by CVE-2022-25927
- Ua-parser-js Project » Ua-parser-js » For Node.jsVersions from including (>=) 0.8.1 and before (<) 1.0.33cpe:2.3:a:ua-parser-js_project:ua-parser-js:*:*:*:*:*:node.js:*:*
- Ua-parser-js Project » Ua-parser-js » For Node.jsVersions from including (>=) 0.7.30 and before (<) 0.7.33cpe:2.3:a:ua-parser-js_project:ua-parser-js:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-25927
0.95%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-25927
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
Snyk |
CWE ids for CVE-2022-25927
-
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-25927
-
https://github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411
Remove unsafe regex in trim() function · faisalman/ua-parser-js@a6140a1 · GitHubPatch;Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450
Regular Expression Denial of Service (ReDoS) in ua-parser-js | CVE-2022-25927 | SnykExploit;Third Party Advisory
Jump to