Bug 2371270 (CVE-2025-5889)

Summary: CVE-2025-5889 brace-expansion: juliangruber brace-expansion index.js expand redos
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: aarif, aazores, abrianik, ahrabovs, alcohan, amctagga, anjoseph, aoconnor, aprice, aschwart, asoldano, ataylor, aucunnin, bbaranow, bdettelb, bmaxwell, bniver, boliveir, brian.stansberry, bsmejkal, caswilli, cdewolf, chfoley, cmah, cmiranda, crizzo, darran.lofthouse, davidn, dbruscin, dfreiber, dhanak, dkreling, dkuc, doconnor, dosoudil, dranck, drosa, drow, dymurray, eaguilar, ebaron, erack, eric.wittmann, fjansen, fjuma, flucifre, ggrzybek, gmalinko, gmeno, gotiwari, gparvin, haoli, hkataria, ibek, ibolton, istudens, ivassile, iweiss, jachapma, jajackso, janstey, jburrell, jcammara, jcantril, jhorak, jkoehler, jmatthew, jmitchel, jmontleo, jneedle, jolong, jprabhak, jrokos, jross, jscholz, jwong, kaycoth, kegrant, koliveir, kshier, kvanderr, kverlaen, lchilton, lgao, lphiri, mabashia, manissin, mbenjamin, mhackett, mnovotny, mosmerov, mpierce, mposolda, msochure, mstoklus, msvehla, mvyas, nipatil, njean, nwallace, owatkins, pahickey, pantinor, parichar, pbizzarr, pbraun, pcongius, pdelbell, periklis, pesilva, pgaikwad, pjindal, pmackay, progier, rhaigner, rjohnson, rkieley, rkubis, rojacob, rstancel, rstepani, sausingh, sdawley, sfeifer, shvarugh, simaishi, slucidi, smaestri, smcdonal, sostapov, spichugi, sseago, ssidhaye, ssilvert, stcannon, sthorger, swoodman, tasato, tbordaz, teagle, tfister, thavo, tom.jenkinson, tpopela, ttakamiy, vashirov, vereddy, vkumar, vmuzikar, wtam, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A denial-of-service (DoS) vulnerability has been identified in the brace-expansion JavaScript package. This issue occurs due to inefficient regular expression complexity, which can be exploited by an attacker providing specially crafted input. Such input could lead to excessive processing time and resource consumption, rendering applications that utilize this package unresponsive and causing a denial-of-service condition.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2373709, 2373712, 2373714, 2373299, 2373300    
Bug Blocks:    

Description OSIDB Bzimport 2025-06-09 19:01:06 UTC
A vulnerability was found in juliangruber brace-expansion up to 1.1.11. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to apply a patch to fix this issue.