
Cloud Vulnerability DB
A community-led vulnerabilities database
A regular expression denial of service (ReDoS) vulnerability was discovered in the prettier code formatter tool up to version 3.6.2. The vulnerability specifically affects the parseNestedCSS function in the src/language-css/parser-postcss.js file. This vulnerability was initially reported on July 28, 2025, but was later withdrawn by its CNA after further investigation showed it was not a security issue (NVD).
The vulnerability was initially assigned a CVSS v3.1 base score with vector string AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, indicating a network-accessible vulnerability with low attack complexity. The issue was classified under CWE-1333 and CWE-400, relating to inefficient regular expression complexity. The vulnerability specifically affects the parseNestedCSS function's handling of input, which could lead to regular expression processing issues (Rapid7).
The vulnerability could potentially allow an attacker with access to input source files to induce a denial of service condition in systems running the affected prettier versions. The impact is limited to availability, with no direct effect on confidentiality or integrity of the system (RedHat).
As the vulnerability was withdrawn after being determined not to be a security issue, no specific mitigation steps were provided. The initial reports indicated that mitigation options either were not available or did not meet Red Hat Product Security criteria for ease of use and deployment (RedHat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."