Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially crafted markdown input, such as deeply nested or repetitively structured brackets or tag attributes, which cause the parser to hang and lead to a Denial of Service.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Aug 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Marked Project
Marked Project marked |
|
CPEs | cpe:2.3:a:marked_project:marked:*:*:*:*:*:node.js:*:* | |
Vendors & Products |
Marked Project
Marked Project marked |
|
Metrics |
cvssV3_1
|
Fri, 23 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Fri, 23 May 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially crafted markdown input, such as deeply nested or repetitively structured brackets or tag attributes, which cause the parser to hang and lead to a Denial of Service. | |
Title | Regular Expression Denial of Service (ReDoS) in markedjs/marked | |
Weaknesses | CWE-1333 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Checkmarx
Published: 2025-05-23T14:53:43.335Z
Updated: 2025-05-23T15:09:17.479Z
Reserved: 2025-05-19T17:17:04.924Z
Link: CVE-2018-25110

Updated: 2025-05-23T15:09:05.531Z

Status : Analyzed
Published: 2025-05-23T15:15:20.210
Modified: 2025-08-13T15:42:28.887
Link: CVE-2018-25110

No data.