All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
References
Link | Resource |
---|---|
https://github.com/jonschlinkert/word-wrap/blob/master/index.js%23L39 | Broken Link |
https://github.com/jonschlinkert/word-wrap/releases/tag/1.2.4 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240621-0006/ | |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657 | Exploit Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-22 05:15
Updated : 2024-06-21 19:15
NVD link : CVE-2023-26115
Mitre link : CVE-2023-26115
CVE.ORG link : CVE-2023-26115
JSON object : View
Products Affected
word-wrap_project
- word-wrap
CWE
CWE-1333
Inefficient Regular Expression Complexity