Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6493

Опубликовано: 22 июн. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A vulnerability was found in CodeMirror up to 5.17.0 and classified as problematic. Affected by this issue is some unknown functionality of the file mode/markdown/markdown.js of the component Markdown Mode. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Not all code samples mentioned in the GitHub issue can be found. The repository mentions, that "CodeMirror 6 exists, and is [...] much more actively maintained."

A flaw was found in codemirror. The markdown.js file within the Markdown Mode component exhibits inefficient regular expression usage, leading to excessive resource consumption. This flaw allows a remote attacker to provide a specially crafted file. This inefficient processing can result in a denial of service.

Отчет

This vulnerability is an inefficient regular expression complexity issue, also known as a Regular Expression Denial of Service (ReDoS), in the Markdown mode component. A remote, unauthenticated attacker can submit a specially crafted input that causes a denial of service (DoS) due to excessive CPU consumption. While the vulnerability is easily exploitable, it only impacts the availability of the component processing the markdown, and does not lead to a compromise of data or system integrity. The assigned severity is Moderate because the flaw, while easy to exploit remotely without authentication, has its impact limited to a denial of service. It does not allow for unauthorized access to data or arbitrary code execution, which would warrant a higher rating.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Serverlessopenshift-serverless-1/kn-backstage-plugins-eventmesh-rhel8Not affected
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Not affected
Red Hat Developer Hubrhdh/rhdh-rhel9-operatorNot affected
Red Hat Enterprise Linux 10gjsNot affected
Red Hat Enterprise Linux 7firefoxNot affected
Red Hat Enterprise Linux 7thunderbirdNot affected
Red Hat Enterprise Linux 8mozjs60Not affected
Red Hat Enterprise Linux 9gjsNot affected
Red Hat Enterprise Linux 9polkitNot affected
Red Hat Fuse 7io.hawt-hawtio-onlineNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2374238codemirror: CodeMirror Markdown Regex Complexity Vulnerability

EPSS

Процентиль: 16%
0.00051
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 месяца назад

A vulnerability was found in CodeMirror up to 5.17.0 and classified as problematic. Affected by this issue is some unknown functionality of the file mode/markdown/markdown.js of the component Markdown Mode. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Not all code samples mentioned in the GitHub issue can be found. The repository mentions, that "CodeMirror 6 exists, and is [...] much more actively maintained."

CVSS3: 5.3
nvd
около 1 месяца назад

A vulnerability was found in CodeMirror up to 5.17.0 and classified as problematic. Affected by this issue is some unknown functionality of the file mode/markdown/markdown.js of the component Markdown Mode. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Not all code samples mentioned in the GitHub issue can be found. The repository mentions, that "CodeMirror 6 exists, and is [...] much more actively maintained."

CVSS3: 5.3
debian
около 1 месяца назад

A vulnerability was found in CodeMirror up to 5.17.0 and classified as ...

CVSS3: 5.3
github
около 1 месяца назад

A vulnerability was found in CodeMirror up to 5.17.0 and classified as problematic. Affected by this issue is some unknown functionality of the file mode/markdown/markdown.js of the component Markdown Mode. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Not all code samples mentioned in the GitHub issue can be found. The repository mentions, that "CodeMirror 6 exists, and is [...] much more actively maintained."

EPSS

Процентиль: 16%
0.00051
Низкий

5.3 Medium

CVSS3