Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially crafted markdown input, such as deeply nested or repetitively structured brackets or tag attributes, which cause the parser to hang and lead to a Denial of Service.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Fri, 23 May 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially crafted markdown input, such as deeply nested or repetitively structured brackets or tag attributes, which cause the parser to hang and lead to a Denial of Service. | |
Title | Regular Expression Denial of Service (ReDoS) in markedjs/marked | |
Weaknesses | CWE-1333 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Checkmarx
Published: 2025-05-23T14:53:43.335Z
Updated: 2025-05-23T15:09:17.479Z
Reserved: 2025-05-19T17:17:04.924Z
Link: CVE-2018-25110

Updated: 2025-05-23T15:09:05.531Z

Status : Awaiting Analysis
Published: 2025-05-23T15:15:20.210
Modified: 2025-05-23T15:54:42.643
Link: CVE-2018-25110

No data.