All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 20 Mar 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift_gitops:1.14::el8
cpe:/a:redhat:openshift_gitops:1.15::el8

Tue, 25 Feb 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Gitops
CPEs cpe:/a:redhat:openshift_gitops:1.13::el8
Vendors & Products Redhat openshift Gitops

Fri, 14 Feb 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 17:00:00 +0000

Type Values Removed Values Added
Description All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable. All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2025-02-13T16:44:48.145Z

Reserved: 2023-02-20T10:28:48.922Z

Link: CVE-2023-26115

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.643Z

cve-icon NVD

Status : Modified

Published: 2023-06-22T05:15:09.157

Modified: 2025-02-13T17:16:11.457

Link: CVE-2023-26115

cve-icon Redhat

Severity : Important

Publid Date: 2023-06-22T00:00:00Z

Links: CVE-2023-26115 - Bugzilla

cve-icon OpenCVE Enrichment

No data.