In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2600-1 | pygments security update |
![]() |
DLA-2648-1 | mediawiki security update |
![]() |
DLA-2648-2 | mediawiki regression update |
![]() |
DSA-4878-1 | pygments security update |
![]() |
DSA-4889-1 | mediawiki security update |
![]() |
EUVD-2021-0208 | In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service. |
![]() |
GHSA-pq64-v7f5-gqh8 | Pygments vulnerable to Regular Expression Denial of Service (ReDoS) |
![]() |
USN-4897-1 | Pygments vulnerability |
![]() |
USN-4897-2 | Pygments vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:48:16.368Z
Reserved: 2021-02-16T00:00:00
Link: CVE-2021-27291

No data.

Status : Modified
Published: 2021-03-17T13:15:15.137
Modified: 2024-11-21T05:57:45.667
Link: CVE-2021-27291


No data.