CVE-2024-45296Regex Denial of Service in Path-to-regexp

Severity
7.7HIGHNVD
NVD7.5GHSA7.5OSV7.5
EPSS
0.1%
top 80.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 9
Latest updateMar 25

Description

path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages10 packages

CVEListV5pillarjs/path-to-regexp< 0.1.12
debiandebian/node-path-to-regexp< node-path-to-regexp 6.3.0-1 (forky)+1
npmpath-to-regexp/path-to-regexp0.2.01.9.0+5
npmmicromatch/picomatch4.0.04.0.4+2
npmfind-my-way_project/find-my-way5.5.08.2.2+1

🔴Vulnerability Details

10
OSV
Picomatch has a ReDoS vulnerability via extglob quantifiers2026-03-25
GHSA
Picomatch has a ReDoS vulnerability via extglob quantifiers2026-03-25
OSV
path-to-regexp contains a ReDoS2024-12-05
GHSA
path-to-regexp contains a ReDoS2024-12-05
OSV
CVE-2024-52798: path-to-regexp turns path strings into a regular expressions2024-12-05

📋Vendor Advisories

5
Red Hat
path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x2024-12-05
Microsoft
path-to-regexp outputs backtracking regular expressions2024-09-10
Red Hat
path-to-regexp: Backtracking regular expressions cause ReDoS2024-09-09
Debian
CVE-2024-45296: node-path-to-regexp - path-to-regexp turns path strings into a regular expressions. In certain cases, ...2024
Debian
CVE-2024-52798: node-path-to-regexp - path-to-regexp turns path strings into a regular expressions. In certain cases, ...2024
CVE-2024-45296 — Regex Denial of Service | cvebase