CVE-2020-36649
LOWmholt PapaParse <5.1.x - Regular Expression Complexity
Title source: llmDescription
A vulnerability was found in mholt PapaParse up to 5.1.x. It has been classified as problematic. Affected is an unknown function of the file papaparse.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 5.2.0 is able to address this issue. The name of the patch is 235a12758cd77266d2e98fd715f53536b34ad621. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218004.
References (6)
Core 6
Core References
Permissions Required, Third Party Advisory vdb-entry
technical-description
https://vuldb.com/?id.218004
Permissions Required, Third Party Advisory signature
permissions-required
https://vuldb.com/?ctiid.218004
Exploit, Issue Tracking, Third Party Advisory issue-tracking
https://github.com/mholt/PapaParse/issues/777
Patch, Third Party Advisory issue-tracking
https://github.com/mholt/PapaParse/pull/779
Patch, Third Party Advisory patch
https://github.com/mholt/PapaParse/commit/235a12758cd77266d2e98fd715f53536b34ad621
Release Notes, Third Party Advisory patch
https://github.com/mholt/PapaParse/releases/tag/5.2.0
Scores
CVSS v3
3.5
EPSS
0.0043
EPSS Percentile
62.5%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Details
CWE
CWE-1333
Status
published
Products (2)
npm/papaparse
0 - 5.2.0npm
papaparse/papaparse
5.1.0 - 5.2.0
Published
Jan 11, 2023
Tracked Since
Feb 18, 2026