Description
Versions of papaparse prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The parse function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
Recommendation
Update the papaparse package to the latest compatible version. Followings are version details:
- Affected version(s): < 5.2.0
- Patched version(s): 5.2.0
References
Related Issues
- Regular Expression Denial of Service in djvalidator - CVE-2020-7779
- CommonRegexJS Regular Expression Denial of Service vulnerability - CVE-2020-26305
- Foundation Regular Expression Denial of Service vulnerability - CVE-2020-26304
- Knwl.js Regular Expression Denial of Service vulnerability - CVE-2020-26306
- Tags:
- npm
- papaparse
Anything's wrong? Let us know Last updated on June 16, 2025