Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @octokit/endpoint
  4. ›
  5. CVE-2025-25285

CVE-2025-25285: @octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking

February 14, 2025 (updated February 17, 2026)

By crafting specific options parameters, the endpoint.parse(options) call can be triggered, leading to a regular expression denial-of-service (ReDoS) attack. This causes the program to hang and results in high CPU utilization.

References

  • github.com/advisories/GHSA-x4c5-c7rf-jjgv
  • github.com/octokit/endpoint.js
  • github.com/octokit/endpoint.js/blob/main/src/parse.ts
  • github.com/octokit/endpoint.js/commit/6c9c5be033c450d436efb37de41b6470c22f7db8
  • github.com/octokit/endpoint.js/security/advisories/GHSA-x4c5-c7rf-jjgv
  • nvd.nist.gov/vuln/detail/CVE-2025-25285

Code Behaviors & Features

Detect and mitigate CVE-2025-25285 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 9.0.5 before 9.0.6, all versions starting from 10.0.0 before 10.1.3

Fixed versions

  • 9.0.6
  • 10.1.3

Solution

Upgrade to versions 10.1.3, 9.0.6 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-1333: Inefficient Regular Expression Complexity

Source file

npm/@octokit/endpoint/CVE-2025-25285.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:19:07 +0000.