Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4242-1 | angular.js security update |
EUVD |
EUVD-2023-0831 | Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. |
Github GHSA |
GHSA-2qqx-w9hr-q5gx | angular vulnerable to regular expression denial of service via the $resource service |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 20 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Angularjs angularjs
|
|
| CPEs | cpe:2.3:a:angularjs:angularjs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Angularjs angular
|
Angularjs angularjs
|
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 14 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-11-03T19:28:07.269Z
Reserved: 2023-02-20T10:28:48.923Z
Link: CVE-2023-26117
Updated: 2025-11-03T19:28:07.269Z
Status : Modified
Published: 2023-03-30T05:15:07.687
Modified: 2025-11-20T17:53:57.180
Link: CVE-2023-26117
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA