We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_imports()` function within `dynamic_module_utils.py`. This vulnerability affects versions 4.49.0 and is fixed in version 4.51.0. The issue arises from a regular expression pattern `\s*try\s*:.*?except.*?:` used to filter out try/except blocks from Python code, which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to remote code loading disruption, resource exhaustion in model serving, supply chain attack vectors, and development pipeline disruption.
Reserved 2025-04-04 | Published 2025-07-07 | Updated 2025-07-07 | Assigner @huntr_aiCWE-1333 Inefficient Regular Expression Complexity
huntr.com/bounties/3c6f7822-9992-476d-8cf0-b0b1623427df
github.com/...ommit/0720e206c6ba28887e4d60ef60a6a089f6c1cc76
Support options