CVE-2025-69873 — Regex Denial of Service in AJV
Severity
2.9LOWNVD
EPSS
0.0%
top 95.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 11
Latest updateApr 15
Description
ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 1.4 | Impact: 1.4
Affected Packages5 packages
🔴Vulnerability Details
4📋Vendor Advisories
3Microsoft▶
ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Poin↗2026-02-10
Debian▶
CVE-2025-69873: node-ajv - ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expre...↗2025