path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of path-to-regexp. Upgrade to 0.1.12. This vulnerability exists because of an incomplete fix for CVE-2024-45296.
This issue has been addressed in the following products: RHODF-4.17-RHEL-9 Via RHSA-2025:0775 https://access.redhat.com/errata/RHSA-2025:0775
This issue has been addressed in the following products: RHODF-4.16-RHEL-9 Via RHSA-2025:0783 https://access.redhat.com/errata/RHSA-2025:0783
This issue has been addressed in the following products: Red Hat OpenShift Service Mesh 2.5 for RHEL 8 Via RHSA-2025:1051 https://access.redhat.com/errata/RHSA-2025:1051
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.17 Via RHSA-2025:0875 https://access.redhat.com/errata/RHSA-2025:0875
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.17 Via RHSA-2025:0876 https://access.redhat.com/errata/RHSA-2025:0876
This issue has been addressed in the following products: HawtIO HawtIO 4.2.0 Via RHSA-2025:8761 https://access.redhat.com/errata/RHSA-2025:8761