Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2953 Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
Github GHSA Github GHSA GHSA-5j4c-8p2g-v4jx ReDoS vulnerability in vue package that is exploitable through inefficient regex evaluation in the parseHTML function
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00037}

epss

{'score': 0.00051}


Wed, 16 Oct 2024 01:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Tue, 15 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 15:45:00 +0000

Type Values Removed Values Added
Description Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
Title Regular Expression Denial of Service (ReDoS)
Weaknesses CWE-1333
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HeroDevs

Published:

Updated: 2024-10-15T16:10:56.576Z

Reserved: 2024-10-03T22:32:46.410Z

Link: CVE-2024-9506

cve-icon Vulnrichment

Updated: 2024-10-15T16:10:50.594Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-15T16:15:06.650

Modified: 2024-10-16T16:38:43.170

Link: CVE-2024-9506

cve-icon Redhat

Severity : Low

Publid Date: 2024-10-15T15:40:04Z

Links: CVE-2024-9506 - Bugzilla

cve-icon OpenCVE Enrichment

No data.