We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5197

Regular Expression Denial of Service (ReDoS) in huggingface/transformers



Description

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the Hugging Face Transformers library, specifically in the `convert_tf_weight_name_to_pt_weight_name()` function. This function, responsible for converting TensorFlow weight names to PyTorch format, uses a regex pattern `/[^/]*___([^/]*)/` that can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. The vulnerability affects versions up to 4.51.3 and is fixed in version 4.53.0. This issue can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting model conversion processes between TensorFlow and PyTorch formats.

Reserved 2025-05-26 | Published 2025-08-06 | Updated 2025-08-06 | Assigner @huntr_ai


MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-1333 Inefficient Regular Expression Complexity

Product status

Any version before 4.53.0
affected

References

huntr.com/bounties/3f8b3fd0-166b-46e7-b60f-60dd9d2678bf

github.com/...ommit/944b56000be5e9b61af8301aa340838770ad8a0b

cve.org (CVE-2025-5197)

nvd.nist.gov (CVE-2025-5197)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5197

Support options

Helpdesk Chat, Email, Knowledgebase