The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3350-1 | node-css-what security update |
EUVD |
EUVD-2022-7138 | The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function. |
Github GHSA |
GHSA-p28h-cc7q-c4fg | css-what vulnerable to ReDoS due to use of insecure regular expression |
Ubuntu USN |
USN-6065-1 | css-what vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 20 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-05-20T16:04:07.202Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-21222
Updated: 2024-08-03T02:31:59.016Z
Status : Modified
Published: 2022-09-30T05:15:08.713
Modified: 2025-05-20T16:15:21.037
Link: CVE-2022-21222
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN