CVE-2022-35923: v8n vulnerable to Inefficient Regular Expression Complexity
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.69071%
CWE
Published
10/7/2022
Updated
7/31/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| v8n | npm | < 1.5.1 | 1.5.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from regex patterns with nested quantifiers ([a-z]+\s*)+ and ([A-Z]+\s*)+ that exhibit exponential time complexity when matching crafted inputs. The commit diff shows these regex-based implementations were replaced with direct string comparison checks in the patch, confirming they were the vulnerable components. The payload example demonstrates how small inputs could trigger excessive backtracking, matching the ReDoS pattern described in CWE-1333.