CVE-2025-25290 – GitHub Octokit Regular Expression Denial of Service (ReDoS)

The following table lists the changes that have been made to the
CVE-2025-25290 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 14, 2025

    Action Type Old Value New Value
    Added Description @octokit/request sends parameterized requests to GitHub’s APIs with sensible defaults in browsers and Node. Starting in version 1.0.0 and prior to version 9.2.1, the regular expression `/]+)>; rel=”deprecation”/` used to match the `link` header in HTTP responses is vulnerable to a ReDoS (Regular Expression Denial of Service) attack. This vulnerability arises due to the unbounded nature of the regex’s matching behavior, which can lead to catastrophic backtracking when processing specially crafted input. An attacker could exploit this flaw by sending a malicious `link` header, resulting in excessive CPU usage and potentially causing the server to become unresponsive, impacting service availability. Version 9.2.1 fixes the issue.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
    Added CWE CWE-1333
    Added Reference https://github.com/octokit/request.js/commit/34ff07ee86fc5c20865982d77391bc910ef19c68
    Added Reference https://github.com/octokit/request.js/security/advisories/GHSA-rmvr-2pp2-xj38
Share the Post:

Related Posts