Description
Versions of papaparse
prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The parse
function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
Recommendation
Update the papaparse
package to the latest compatible version. Followings are version details:
- Affected version(s): < 5.2.0
- Patched version(s): 5.2.0
References
Related Issues
- Command Injection in lodash (GHSA-35jh-r3h4-6jhm) - CVE-2021-23337
- Regular Expression Denial of Service in jsoneditor - CVE-2021-3822
- @intlify/shared Prototype Pollution vulnerability - CVE-2024-52810
- DOMPurify allows tampering by prototype pollution - CVE-2024-45801
- Tags:
- npm
- papaparse
Anything's wrong? Let us know Last updated on June 16, 2025