CVE-2020-36649

LOW

mholt PapaParse <5.1.x - Regular Expression Complexity

Title source: llm
STIX 2.1

Description

A vulnerability was found in mholt PapaParse up to 5.1.x. It has been classified as problematic. Affected is an unknown function of the file papaparse.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 5.2.0 is able to address this issue. The name of the patch is 235a12758cd77266d2e98fd715f53536b34ad621. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218004.

References (6)

Core 6
Core References
Permissions Required, Third Party Advisory vdb-entry technical-description
https://vuldb.com/?id.218004
Permissions Required, Third Party Advisory signature permissions-required
https://vuldb.com/?ctiid.218004
Exploit, Issue Tracking, Third Party Advisory issue-tracking
https://github.com/mholt/PapaParse/issues/777
Patch, Third Party Advisory issue-tracking
https://github.com/mholt/PapaParse/pull/779
Release Notes, Third Party Advisory patch
https://github.com/mholt/PapaParse/releases/tag/5.2.0

Scores

CVSS v3 3.5
EPSS 0.0043
EPSS Percentile 62.5%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-1333
Status published
Products (2)
npm/papaparse 0 - 5.2.0npm
papaparse/papaparse 5.1.0 - 5.2.0
Published Jan 11, 2023
Tracked Since Feb 18, 2026