Description
Affected versions of debug
are vulnerable to regular expression denial of service when untrusted user input is passed into the o
formatter.
As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.
This was later re-introduced in version v3.2.0, and then repatched in versions 3.2.7 and 4.3.1.
Recommendation
Update the debug
package to the latest compatible version. Followings are version details:
Affected version(s): **>= 4.0.0, < 4.3.1 >= 3.2.0, < 3.2.7 >= 3.0.0, < 3.1.0 < 2.6.9** Patched version(s): **4.3.1 3.2.7 3.1.0 2.6.9**
References
Related Issues
- counterpart vulnerable to prototype pollution - CVE-2025-57354
- Payload does not invalidate JWTs after log out - CVE-2025-4643
- Parse Server has an OAuth login vulnerability - CVE-2025-30168
- Use of Insufficiently Random Values in undici - CVE-2025-22150
- Tags:
- npm
- debug
Anything's wrong? Let us know Last updated on March 25, 2024