We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5889

juliangruber brace-expansion index.js expand redos



Description

EN DE

A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to upgrade the affected component.

Eine problematische Schwachstelle wurde in juliangruber brace-expansion bis 1.1.11/2.0.1/3.0.0/4.0.0 ausgemacht. Davon betroffen ist die Funktion expand der Datei index.js. Durch Manipulieren mit unbekannten Daten kann eine inefficient regular expression complexity-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 vermag dieses Problem zu lösen. Der Patch wird als a5b98a4f30d7813266b221435e1eaaf25a1b0ac5 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.

Reserved 2025-06-09 | Published 2025-06-09 | Updated 2025-06-11 | Assigner VulDB


LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
LOW: 3.1CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2.1AV:N/AC:H/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C

Problem types

Inefficient Regular Expression Complexity

Resource Consumption

Product status

1.1.0
affected

1.1.1
affected

1.1.2
affected

1.1.3
affected

1.1.4
affected

1.1.5
affected

1.1.6
affected

1.1.7
affected

1.1.8
affected

1.1.9
affected

1.1.10
affected

1.1.11
affected

2.0.0
affected

2.0.1
affected

3.0
affected

4.0
affected

1.1.12
unaffected

2.0.2
unaffected

3.0.1
unaffected

4.0.1
unaffected

Timeline

2025-06-09:Advisory disclosed
2025-06-09:VulDB entry created
2025-06-11:VulDB entry last update

Credits

mmmsssttt (VulDB User) reporter

tgerbet_enalean (VulDB User) analyst

References

vuldb.com/?id.311660 (VDB-311660 | juliangruber brace-expansion index.js expand redos) vdb-entry technical-description

vuldb.com/?ctiid.311660 (VDB-311660 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.585717 (Submit #585717 | juliangruber @juliangruber/brace-expansion 1.1.11 Inefficient Regular Expression Complexity) third-party-advisory

gist.github.com/...ssttt404/37a40ce7d6e5ca604858fe30814d9466 exploit

github.com/...mmits/a5b98a4f30d7813266b221435e1eaaf25a1b0ac5 issue-tracking patch

github.com/juliangruber/brace-expansion/releases/tag/v4.0.1 patch

cve.org (CVE-2025-5889)

nvd.nist.gov (CVE-2025-5889)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5889

Support options

Helpdesk Chat, Email, Knowledgebase