Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-37mw-44qp-f5jm

Опубликовано: 11 июл. 2025
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Transformers is vulnerable to ReDoS attack through its DonutProcessor class

A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's token2json() method. This vulnerability affects versions 4.51.3 and earlier, and is fixed in version 4.52.1. The issue arises from the regex pattern <s_(.*?)> which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting document processing tasks using the Donut model.

Пакеты

Наименование

transformers

pip
Затронутые версииВерсия исправления

<= 4.51.3

4.52.1

EPSS

Процентиль: 22%
0.00071
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-1333

Связанные уязвимости

CVSS3: 5.3
redhat
около 1 месяца назад

A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's `token2json()` method. This vulnerability affects versions 4.50.3 and earlier, and is fixed in version 4.52.1. The issue arises from the regex pattern `<s_(.*?)>` which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting document processing tasks using the Donut model.

CVSS3: 5.3
nvd
около 1 месяца назад

A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's `token2json()` method. This vulnerability affects versions 4.50.3 and earlier, and is fixed in version 4.52.1. The issue arises from the regex pattern `<s_(.*?)>` which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting document processing tasks using the Donut model.

EPSS

Процентиль: 22%
0.00071
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-1333