Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially crafted markdown input, such as deeply nested or repetitively structured brackets or tag attributes, which cause the parser to hang and lead to a Denial of Service.
History

Fri, 23 May 2025 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 May 2025 15:00:00 +0000

Type Values Removed Values Added
Description Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially crafted markdown input, such as deeply nested or repetitively structured brackets or tag attributes, which cause the parser to hang and lead to a Denial of Service.
Title Regular Expression Denial of Service (ReDoS) in markedjs/marked
Weaknesses CWE-1333
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Checkmarx

Published: 2025-05-23T14:53:43.335Z

Updated: 2025-05-23T15:09:17.479Z

Reserved: 2025-05-19T17:17:04.924Z

Link: CVE-2018-25110

cve-icon Vulnrichment

Updated: 2025-05-23T15:09:05.531Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-23T15:15:20.210

Modified: 2025-05-23T15:54:42.643

Link: CVE-2018-25110

cve-icon Redhat

No data.