This advisory has been withdrawn because the attack surface of this vulnerability is outside of Knack's intended functionality. The maintainer states the following:
These CVEs are invalid. Knack is a CLI framework used by Azure CLI. It's a local library, not a web service. In addition, the regex is used to extract function and parameter docstrings from the source code. It is not used to match user input. Therefore, it does not expose any attack surface. There is no way to use it for ReDoS attack.
This link is maintained to preserve external references.
Microsoft Knack 0.12.0 allows Regular expression Denial of Service (ReDoS) in the knack.introspection module (issue 2 of 2).
{
"cwe_ids": [
"CWE-1333"
],
"severity": "LOW",
"github_reviewed": true,
"nvd_published_at": "2025-08-20T03:15:35Z",
"github_reviewed_at": "2025-08-21T15:01:00Z"
}