#VU112200 Inefficient regular expression complexity in endpoint.js - CVE-2025-25285

 

#VU112200 Inefficient regular expression complexity in endpoint.js - CVE-2025-25285

Published: July 4, 2025


Vulnerability identifier: #VU112200
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-25285
CWE-ID: CWE-1333
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
endpoint.js
Software vendor:
octokit

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to by crafting specific `options` parameters, the `endpoint.parse(options)` call can be triggered, leading to a regular expression denial-of-service (ReDoS) attack. This causes the program to hang and results in high CPU utilization. A remote attacker can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability..

External links