Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-25290— @octokit/request has a Regular Expression in fetchWrapper that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking

CVSS 5.3 · Medium EPSS 0.08% · P24
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-25290

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
@octokit/request has a Regular Expression in fetchWrapper that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking
Source: NVD (National Vulnerability Database)
Vulnerability Description
@octokit/request sends parameterized requests to GitHub’s APIs with sensible defaults in browsers and Node. Starting in version 1.0.0 and prior to versions 9.2.1 and 8.4.1, the regular expression `/<([^>]+)>; rel="deprecation"/` used to match the `link` header in HTTP responses is vulnerable to a ReDoS (Regular Expression Denial of Service) attack. This vulnerability arises due to the unbounded nature of the regex's matching behavior, which can lead to catastrophic backtracking when processing specially crafted input. An attacker could exploit this flaw by sending a malicious `link` header, resulting in excessive CPU usage and potentially causing the server to become unresponsive, impacting service availability. Versions 9.2.1 and 8.4.1 fix the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1333
Source: NVD (National Vulnerability Database)
Vulnerability Title
Octokit 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Octokit是GitHub API 的 Ruby 工具包。 Octokit 1.0.0版本至9.2.1之前版本存在安全漏洞,该漏洞源于正则表达式匹配行为的无限制性质,可能导致在处理特制输入时发生灾难性的回溯,容易受到正则表达式拒绝服务(ReDoS)攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
octokitrequest.js >= 1.0.0, < 9.2.1 -

II. Public POCs for CVE-2025-25290

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-25290

登录查看更多情报信息。

Same Patch Batch · octokit · 2025-02-14 · 4 CVEs total

CVE-2025-252855.3 MEDIUM@octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due
CVE-2025-252885.3 MEDIUM@octokit/plugin-paginate-rest has a Regular Expression in iterator that Leads to ReDoS Vul
CVE-2025-252895.3 MEDIUM@octokit/request-error has a Regular Expression in index that Leads to ReDoS Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2025-25290

No comments yet


Leave a comment