Vulnerability Description
All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Scss-Tokenizer Project | Scss-Tokenizer | All versions |
Related Weaknesses (CWE)
References
- https://github.com/sasstools/scss-tokenizer/issues/45ExploitIssue TrackingThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884ExploitThird Party Advisory
- https://github.com/sasstools/scss-tokenizer/issues/45ExploitIssue TrackingThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884ExploitThird Party Advisory
FAQ
What is CVE-2022-25758?
CVE-2022-25758 is a vulnerability with a CVSS score of 5.3 (MEDIUM). All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
How severe is CVE-2022-25758?
CVE-2022-25758 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-25758?
Check the references section above for vendor advisories and patch information. Affected products include: Scss-Tokenizer Project Scss-Tokenizer.