We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-1194

Regular Expression Denial of Service (ReDoS) in huggingface/transformers



Description

A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the GPT-NeoX-Japanese model. The vulnerability occurs in the SubWordJapaneseTokenizer class, where regular expressions process specially crafted inputs. The issue stems from a regex exhibiting exponential complexity under certain conditions, leading to excessive backtracking. This can result in high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.48.1 (latest).

Reserved 2025-02-10 | Published 2025-04-29 | Updated 2025-04-29 | Assigner @huntr_ai


MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Problem types

CWE-1333 Inefficient Regular Expression Complexity

Product status

Any version before 4.50.0
affected

References

huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2

github.com/...ommit/92c5ca9dd70de3ade2af2eb835c96215cc50e815

cve.org (CVE-2025-1194)

nvd.nist.gov (CVE-2025-1194)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-1194

Support options

Helpdesk Chat, Email, Knowledgebase