The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.
{
"license": "CC-BY-4.0",
"sources": [
{
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58050",
"id": "CVE-2025-58050",
"modified": "2025-09-09T15:27:39.573Z",
"imported": "2026-04-07T04:05:25.373Z",
"published": "2025-08-27T19:15:37.560Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-58050"
},
{
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-25947",
"id": "EUVD-2025-25947",
"modified": "2025-08-27T18:47:35Z",
"published": "2025-08-27T18:47:35Z",
"imported": "2026-04-07T04:05:26.549Z",
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2025-25947"
}
]
}