There is a possibility for Regular expression Denial of Service (ReDoS) by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27220. We recommend upgrading the cgi gem.
The regular expression used in CGI::Util#escapeElement
is vulnerable to ReDoS. The crafted input could lead to a high CPU consumption.
This vulnerability only affects Ruby 3.1 and 3.2. If you are using these versions, please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later.
cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1.
Thanks to svalkanov for discovering this issue. Also thanks to nobu for fixing this vulnerability.
{ "nvd_published_at": "2025-03-04T00:15:31Z", "cwe_ids": [ "CWE-1333" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-03-03T22:05:08Z" }