CVE-2025-5891
JavaScript vulnerability analysis and mitigation

Overview

A vulnerability classified as problematic was discovered in Unitech pm2 versions up to 6.0.6, identified as CVE-2025-5891. The vulnerability affects the /lib/tools/Config.js file and involves inefficient regular expression complexity that can be exploited remotely. The vulnerability was disclosed on June 9, 2025, and public exploit code is available (NVD, CVE).

Technical details

The vulnerability stems from an inefficient regular expression implementation in the Config.js file of the pm2 project. The issue is categorized under CWE-400 (Uncontrolled Resource Consumption) and CWE-1333 (Inefficient Regular Expression Complexity). The vulnerability has received a CVSS v4.0 score of 5.3 (Medium) with vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P, and a CVSS v3.1 score of 4.3 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L (NVD).

Impact

The vulnerability can lead to Denial of Service (DoS) through excessive CPU consumption when processing specially crafted input. When exploited, it can cause extremely high CPU usage and application freezing, potentially affecting the availability of services running on pm2 (GitHub PR).

Mitigation and workarounds

A fix has been proposed through a pull request to the pm2 project that addresses the inefficient regular expression implementation. Users are advised to update their pm2 installations once a patched version becomes available (GitHub PR).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management