First published: Tue Aug 30 2022(Updated: )
Node.js sanitize-html module is vulnerable to a denial of service, caused by insecure global regular expression replacement logic of HTML comment removal. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a Regular Expression Denial of Service (ReDoS).
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Apostrophecms Sanitize-html | <2.7.1 | |
IBM Cloud Pak for Business Automation | <=V22.0.2 | |
IBM Cloud Pak for Business Automation | <=V21.0.3 - V21.0.3-IF016 | |
IBM Cloud Pak for Business Automation | <=V22.0.1 - V22.0.1-IF006 and later fixes V21.0.2 - V21.0.2-IF012 and later fixesV21.0.1 - V21.0.1-IF007 and later fixesV20.0.1 - V20.0.3 and later fixesV19.0.1 - V19.0.3 and later fixesV18.0.0 - V18.0.2 and later fixes | |
redhat/sanitize-html | <2.7.1 | 2.7.1 |
npm/sanitize-html | <2.7.1 | 2.7.1 |
<2.7.1 |
https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-25887.
The severity of CVE-2022-25887 is high with a CVSS score of 7.5.
The sanitize-html package before version 2.7.1 is affected by CVE-2022-25887.
CVE-2022-25887 can be exploited by a remote attacker to cause a Regular Expression Denial of Service (ReDoS).
To fix CVE-2022-25887, update the sanitize-html package to version 2.7.1 or later.