CVE-2019-25102

MEDIUM

simple-markdown <0.6.1 - Inefficient Regular Expression Complexity

Title source: llm
STIX 2.1

Description

A vulnerability, which was classified as problematic, was found in simple-markdown 0.6.0. Affected is an unknown function of the file simple-markdown.js. The manipulation with the input <<<<<<<<<<:/:/:/:/:/:/:/:/:/:/ leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.6.1 is able to address this issue. The patch is identified as 015a719bf5cdc561feea05500ecb3274ef609cd2. It is recommended to upgrade the affected component. VDB-220638 is the identifier assigned to this vulnerability.

References (5)

Core 5
Core References
Permissions Required, Third Party Advisory vdb-entry technical-description
https://vuldb.com/?id.220638
Permissions Required, Third Party Advisory signature permissions-required
https://vuldb.com/?ctiid.220638
Exploit, Issue Tracking, Patch exploit issue-tracking
https://github.com/ariabuckles/simple-markdown/pull/73

Scores

CVSS v3 4.3
EPSS 0.0024
EPSS Percentile 46.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-1333
Status published
Products (2)
khanacademy/simple-markdown 0.6.0
npm/simple-markdown 0 - 0.6.1npm
Published Feb 12, 2023
Tracked Since Feb 18, 2026