/
DirectorySecurity Advisories
Sign In
Security Advisories

CVE-2025-25290

Published

Last updated

NVD

https://nvd.nist.gov/vuln/detail/CVE-2025-25290

CGA ID

CGA-2wx9-rvv6-j8wx

Severity

5.3

Medium

CVSS V3

Description

@octokit/request sends parameterized requests to GitHub’s APIs with sensible defaults in browsers and Node. Starting in version 1.0.0 and prior to version 9.2.1, the regular expression /<([^>]+)>; rel="deprecation"/ used to match the link header in HTTP responses is vulnerable to a ReDoS (Regular Expression Denial of Service) attack. This vulnerability arises due to the unbounded nature of the regex's matching behavior, which can lead to catastrophic backtracking when processing specially crafted input. An attacker could exploit this flaw by sending a malicious link header, resulting in excessive CPU usage and potentially causing the server to become unresponsive, impacting service availability. Version 9.2.1 fixes the issue.

References

  • https://images.chainguard.dev/security/CGA-2wx9-rvv6-j8wx

Affected packages


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Products

Chainguard ContainersChainguard LibrariesChainguard VMs