CVE-2025-58451
JavaScript vulnerability analysis and mitigation

Overview

Cattown is a JavaScript markdown parser that contained security vulnerabilities in versions prior to 1.0.2. The vulnerability was discovered and disclosed on September 8, 2025, affecting all versions of Cattown below 1.0.2. The issue was identified through CodeQL static analysis and has been assigned CVE-2025-58451 (GitHub Advisory).

Technical details

The vulnerability stems from two main issues: inefficient regular expression complexity (CWE-1333) and uncontrolled resource consumption (CWE-400). The package used regular expressions with inefficient, potentially exponential worst-case complexity that could cause excessive CPU usage due to excessive backtracking on crafted inputs. The CVSS v4.0 Base Score is 8.7 (High) with the vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N (AttackerKB, NVD).

Impact

The vulnerability could lead to denial of service through resource exhaustion, where processing malicious inputs could cause high CPU or memory usage. This could affect service availability and potentially bypass protection mechanisms, causing unexpected or insecure behavior (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.0.2 of Cattown. The fix includes improvements to regular expression patterns and implementation of input length limits to prevent resource exhaustion. Users are strongly encouraged to upgrade to version 1.0.2 or later. Additionally, it is recommended to review and restrict input sources if untrusted inputs are processed (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-58451HIGH8.7
  • JavaScriptJavaScript
  • cattown
NoYesSep 08, 2025
CVE-2025-59037HIGH8.6
  • JavaScriptJavaScript
  • @duckdb/duckdb-wasm
NoYesSep 09, 2025
CVE-2025-58444HIGH8.6
  • JavaScriptJavaScript
  • @modelcontextprotocol/inspector
NoYesSep 08, 2025
CVE-2025-58752LOW2.3
  • JavaScriptJavaScript
  • vite
NoYesSep 08, 2025
CVE-2025-58751LOW2.3
  • JavaScriptJavaScript
  • vite
NoYesSep 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management