CVE-2025-25290

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-25290
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25290.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-25290
Aliases
Related
Published
2025-02-14T20:15:35Z
Modified
2025-02-15T08:45:14.582178Z
Summary
[none]
Details

@octokit/request sends parameterized requests to GitHub’s APIs with sensible defaults in browsers and Node. Starting in version 1.0.0 and prior to version 9.2.1, the regular expression /<([^>]+)>; rel="deprecation"/ used to match the link header in HTTP responses is vulnerable to a ReDoS (Regular Expression Denial of Service) attack. This vulnerability arises due to the unbounded nature of the regex's matching behavior, which can lead to catastrophic backtracking when processing specially crafted input. An attacker could exploit this flaw by sending a malicious link header, resulting in excessive CPU usage and potentially causing the server to become unresponsive, impacting service availability. Version 9.2.1 fixes the issue.

References

Affected packages

Git / github.com/octokit/request.js

Affected ranges

Type
GIT
Repo
https://github.com/octokit/request.js
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.1
v2.1.2
v2.2.0
v2.2.1
v2.3.0
v2.4.0
v2.4.1
v2.4.2

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3

v4.*

v4.0.0
v4.0.1
v4.0.2
v4.1.0
v4.1.1

v5.*

v5.0.0
v5.0.1
v5.0.2
v5.0.3
v5.1.0
v5.2.0
v5.2.1
v5.3.0
v5.3.1
v5.3.2
v5.3.3
v5.3.4
v5.4.0
v5.4.1
v5.4.10
v5.4.11
v5.4.12
v5.4.13
v5.4.14
v5.4.15
v5.4.2
v5.4.3
v5.4.4
v5.4.5
v5.4.6
v5.4.7
v5.4.8
v5.4.9
v5.5.0
v5.6.0
v5.6.1
v5.6.2
v5.6.3

v6.*

v6.0.0
v6.0.1
v6.0.2
v6.1.0
v6.2.0
v6.2.1
v6.2.2
v6.2.3
v6.2.4
v6.2.5
v6.2.6
v6.2.7

v7.*

v7.0.0
v7.0.1

v8.*

v8.0.0
v8.0.1
v8.0.2
v8.0.3
v8.0.4
v8.1.0
v8.1.1
v8.1.2
v8.1.3
v8.1.4
v8.1.5
v8.1.6
v8.2.0

v9.*

v9.0.0
v9.0.1
v9.1.0
v9.1.1
v9.1.2
v9.1.3
v9.1.4
v9.2.0