CVE-2022-30973: Regular expression denial of service in apache tika
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33253%
CWE
Published
6/1/2022
Updated
8/24/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.tika:tika-core | maven | >= 1.17, < 1.28.3 | 1.28.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the original REGEX_HEADER pattern in StandardsText.java, which used vulnerable unbounded quantifiers. The commit diff shows direct modification of this regex to add bounds (e.g., {1,10} instead of +), confirming it as the root cause. Though not a traditional function, the regex definition acts as a critical configuration point consumed by pattern-matching logic. The CWE-1333 classification and patch context explicitly identify this regex as the vulnerable component.