{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-25844","assignerOrgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","assignerShortName":"snyk","datePublished":"2022-05-01T15:25:32.752Z","dateUpdated":"2025-11-03T19:26:56.516Z","dateReserved":"2022-02-24T00:00:00.000Z"},"containers":{"cna":{"title":"Regular Expression Denial of Service (ReDoS)","datePublic":"2022-05-01T00:00:00.000Z","providerMetadata":{"orgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","shortName":"snyk","dateUpdated":"2022-10-28T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The package angular after 1.7.0 are vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **Note:** 1) This package has been deprecated and is no longer maintained. 2) The vulnerable versions are 1.7.0 and higher."}],"affected":[{"vendor":"n/a","product":"angular","versions":[{"version":"next of 1.7.0","status":"affected","lessThan":"unspecified","versionType":"custom"}]}],"references":[{"url":"https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735"},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736"},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737"},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738"},{"url":"https://stackblitz.com/edit/angularjs-material-blank-zvtdvb"},{"url":"https://security.netapp.com/advisory/ntap-20220629-0009/"},{"name":"FEDORA-2022-e016e6f445","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2WUSPYOTOMAZPDEFPWPSCSPMNODRDKK3/"},{"name":"FEDORA-2022-edf635cf39","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LNAKCNTVBIHWAUT3FKWV5N67PQXSZOO/"}],"credits":[{"lang":"en","value":"Michael Prentice"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","exploitCodeMaturity":"FUNCTIONAL","remediationLevel":"NOT_DEFINED","reportConfidence":"NOT_DEFINED","baseScore":5.3,"temporalScore":5.2,"baseSeverity":"MEDIUM","temporalSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Regular Expression Denial of Service (ReDoS)"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735","tags":["x_transferred"]},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736","tags":["x_transferred"]},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737","tags":["x_transferred"]},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738","tags":["x_transferred"]},{"url":"https://stackblitz.com/edit/angularjs-material-blank-zvtdvb","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20220629-0009/","tags":["x_transferred"]},{"name":"FEDORA-2022-e016e6f445","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2WUSPYOTOMAZPDEFPWPSCSPMNODRDKK3/"},{"name":"FEDORA-2022-edf635cf39","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LNAKCNTVBIHWAUT3FKWV5N67PQXSZOO/"},{"url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:26:56.516Z"}}]}}