Security: VULN CVE-2025-6493 in codemirror #7139

Closed
opened 2025-08-30 09:11:54 +02:00 by marijnh · 1 comment
marijnh commented 2025-08-30 09:11:54 +02:00 (Migrated from gitlab.com)

A vulnerability has been discovered in CodeMirror (≤ 5.17.0) affecting the Markdown mode (mode/markdown/markdown.js). This flaw leads to inefficient regular expression complexity, making the component susceptible to a Regular Expression Denial of Service (ReDoS). The exploit can be triggered remotely.

Details

Component: mode/markdown/markdown.js

Vulnerability Type: ReDoS via greedy quantifiers combined with unbounded capture groups—leading to exponential backtracking

CVSS Score:

v3.1: 5.3 (Medium)
v4.0: 5.5 (Medium)

Exploitability:

  • The issue is easy to exploit

  • Attack can be launched remotely by supplying crafted Markdown input

Impact

This vulnerability allows an attacker to craft Markdown input that causes excessive CPU usage in the affected component. This leads to:

  • Service unavailability or performance degradation

  • If the component is part of a live user-facing parsing pipeline, it may impair availability of the editor or consuming service

  • No direct risk to data integrity or confidentiality, but a clear DoS vector exists

A vulnerability has been discovered in CodeMirror (≤ 5.17.0) affecting the Markdown mode (mode/markdown/markdown.js). This flaw leads to inefficient regular expression complexity, making the component susceptible to a Regular Expression Denial of Service (ReDoS). The exploit can be triggered remotely. ## Details **Component**: mode/markdown/markdown.js **Vulnerability Type**: ReDoS via greedy quantifiers combined with unbounded capture groups—leading to exponential backtracking **CVSS Score**: v3.1: 5.3 (Medium) v4.0: 5.5 (Medium) Exploitability: - The issue is easy to exploit - Attack can be launched remotely by supplying crafted Markdown input ## Impact This vulnerability allows an attacker to craft Markdown input that causes excessive CPU usage in the affected component. This leads to: - Service unavailability or performance degradation - If the component is part of a live user-facing parsing pipeline, it may impair availability of the editor or consuming service - No direct risk to data integrity or confidentiality, but a clear DoS vector exists
marijnh commented 2025-09-01 17:46:15 +02:00 (Migrated from gitlab.com)
Duplicated of https://github.com/codemirror/codemirror5/issues/7128, it looks like.
marijnh (Migrated from gitlab.com) closed this issue 2025-09-01 17:46:15 +02:00
Sign in to join this conversation.
No labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
codemirror/codemirror5#7139
No description provided.