Regular Expression Denial of Service in moment (GHSA-87vv-r9j6-g5qv)
- Severity:
- Medium
Description
Versions of moment prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into moment.duration().
Recommendation
Update the moment package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.11.2
- Patched version(s): 2.11.2
References
- GHSA-87vv-r9j6-g5qv
- www.npmjs.com
- lists.apache.org
- www.tenable.com
- www.openwall.com
- www.oracle.com
- www.securityfocus.com
- CVE-2016-4055
- CWE-400
- CAPEC-310
- OWASP 2021-A6
Related Issues
- Finance.js vulnerable to DoS via the IRR function’s depth parameter - CVE-2025-56571
- Mermaid improperly sanitizes sequence diagram labels leading to XSS - CVE-2025-54881
- Payload does not invalidate JWTs after log out (GHSA-5v66-m237-hwf7) - CVE-2025-4643
- Vite's server.fs.deny bypassed with /. for files under project root - CVE-2025-46565
- Tags:
- npm
- moment
Anything's wrong? Let us know Last updated on February 03, 2023