We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3933

Regular Expression Denial of Service (ReDoS) in huggingface/transformers



Description

A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's `token2json()` method. This vulnerability affects versions 4.50.3 and earlier, and is fixed in version 4.52.1. The issue arises from the regex pattern `<s_(.*?)>` which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting document processing tasks using the Donut model.

Reserved 2025-04-25 | Published 2025-07-11 | Updated 2025-07-11 | Assigner @huntr_ai


MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-1333 Inefficient Regular Expression Complexity

Product status

Any version before 4.52.1
affected

References

huntr.com/bounties/25282953-5827-4384-bb6f-5790d275721b

github.com/...ommit/ebbe9b12dd75b69f92100d684c47f923ee262a93

cve.org (CVE-2025-3933)

nvd.nist.gov (CVE-2025-3933)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3933

Support options

Helpdesk Chat, Email, Knowledgebase