Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-25289— @octokit/request-error has a Regular Expression in index that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking

CVSS 5.3 · Medium EPSS 0.07% · P21
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-25289

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
@octokit/request-error has a Regular Expression in index that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking
Source: NVD (National Vulnerability Database)
Vulnerability Description
@octokit/request-error is an error class for Octokit request errors. Starting in version 1.0.0 and prior to version 6.1.7, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the processing of HTTP request headers. By sending an authorization header containing an excessively long sequence of spaces followed by a newline and "@", an attacker can exploit inefficient regular expression processing, leading to excessive resource consumption. This can significantly degrade server performance or cause a denial-of-service (DoS) condition, impacting availability. Version 6.1.7 contains a fix for the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1333
Source: NVD (National Vulnerability Database)
Vulnerability Title
Octokit 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Octokit是GitHub API 的 Ruby 工具包。 Octokit 1.0.0版本至6.1.7之前版本存在安全漏洞,该漏洞源于HTTP请求标头的处理中存在正则表达式拒绝服务(ReDoS)漏洞,攻击者可以利用低效的正则表达式处理导致资源消耗过多。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
octokitrequest-error.js >= 1.0.0, < 6.1.7 -

II. Public POCs for CVE-2025-25289

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-25289

登录查看更多情报信息。

Same Patch Batch · octokit · 2025-02-14 · 4 CVEs total

CVE-2025-252855.3 MEDIUM@octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due
CVE-2025-252885.3 MEDIUM@octokit/plugin-paginate-rest has a Regular Expression in iterator that Leads to ReDoS Vul
CVE-2025-252905.3 MEDIUM@octokit/request has a Regular Expression in fetchWrapper that Leads to ReDoS Vulnerabilit

IV. Related Vulnerabilities

V. Comments for CVE-2025-25289

No comments yet


Leave a comment