Regular Expression Denial of Service in moment (GHSA-87vv-r9j6-g5qv)
- Severity:
- Medium
Description
Versions of moment
prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into moment.duration()
.
Recommendation
Update the moment
package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.11.2
- Patched version(s): 2.11.2
References
- GHSA-87vv-r9j6-g5qv
- www.npmjs.com
- lists.apache.org
- www.tenable.com
- www.openwall.com
- www.oracle.com
- www.securityfocus.com
- CVE-2016-4055
- CWE-400
- CAPEC-310
- OWASP 2021-A6
Related Issues
- Finance.js vulnerable to DoS via the IRR function’s depth parameter - CVE-2025-56571
- Mermaid improperly sanitizes sequence diagram labels leading to XSS - CVE-2025-54881
- Payload does not invalidate JWTs after log out (GHSA-5v66-m237-hwf7) - CVE-2025-4643
- Vite's server.fs.deny bypassed with /. for files under project root - CVE-2025-46565
- Tags:
- npm
- moment
Anything's wrong? Let us know Last updated on February 03, 2023