#VU112171 Inefficient regular expression complexity in request-error.js - CVE-2025-25289
Published: July 4, 2025
request-error.js
octokit
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation when processing untrusted input with a regular expressions in the processing of HTTP request headers. A remote attacker can send an authorization header containing an excessively long sequence of spaces followed by a newline and "@" to exploit inefficient regular expression processing and leading to excessive resource consumption.