Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23956

Опубликовано: 22 янв. 2026
Источник: redhat
CVSS3: 7.5

Описание

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, overriding RegExp serialization with extremely large patterns can exhaust JavaScript runtime memory during deserialization. Additionally, overriding RegExp serialization with patterns that trigger catastrophic backtracking can lead to ReDoS (Regular Expression Denial of Service). This issue has been fixed in version 1.4.1.

A flaw was found in seroval, a JavaScript (JS) value stringification library. A remote attacker could exploit this vulnerability by providing specially crafted regular expressions during deserialization. This could lead to the exhaustion of JavaScript runtime memory or trigger a Regular Expression Denial of Service (ReDoS), making the application unavailable to legitimate users.

Отчет

This vulnerability is rated Important for Red Hat as it can lead to a Denial of Service in applications utilizing the seroval library. Specifically, versions 1.4.0 and below are susceptible to memory exhaustion or Regular Expression Denial of Service (ReDoS) when processing maliciously crafted serialized regular expressions. This affects community projects such as Forgejo in Fedora and EPEL.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2431917seroval: Seroval: Denial of Service via malicious regular expressions during deserialization

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
2 месяца назад

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, overriding RegExp serialization with extremely large patterns can exhaust JavaScript runtime memory during deserialization. Additionally, overriding RegExp serialization with patterns that trigger catastrophic backtracking can lead to ReDoS (Regular Expression Denial of Service). This issue has been fixed in version 1.4.1.

CVSS3: 7.5
github
2 месяца назад

seroval affected by Denial of Service via RegExp serialization

7.5 High

CVSS3