Description
Versions of papaparse prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The parse function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
Recommendation
Update the papaparse package to the latest compatible version. Followings are version details:
- Affected version(s): < 5.2.0
- Patched version(s): 5.2.0
References
Related Issues
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-29mw-wpgm-hmr9) - CVE-2020-28500
- Knwl.js Regular Expression Denial of Service vulnerability - CVE-2020-26306
- CommonRegexJS Regular Expression Denial of Service vulnerability - CVE-2020-26305
- Foundation Regular Expression Denial of Service vulnerability - CVE-2020-26304
- Tags:
- npm
- papaparse
Anything's wrong? Let us know Last updated on June 16, 2025