Impact
Mistune is a popular Python Markdown parser. A ReDoS flaw exists in the LINK_TITLE_RE regular expression used for parsing link titles. The pattern contains overlapping alternatives that trigger catastrophic backtracking when an attacker supplies a crafted title with repeated exclamation marks and no closing quote. The resulting exponential CPU consumption can make the application using Mistune become unresponsive, thereby causing a denial of service. The vulnerability is ranked as CWE‑1333, indicating an overly complex or inefficient regular expression.
Affected Systems
All applications that embed Mistune versions 3.0.0a1 through 3.2.0 are affected. The flaw is present in the source file mistune/helpers.py and applies to both inline links and block link reference definitions in Markdown documents.
Risk and Exploitability
The CVSS base score of 8.7 denotes high severity, and the EPSS score is not available, meaning no publicly documented exploitation probability. The vulnerability is not listed in the CISA KEV catalog. An attacker can trigger the denial of service by supplying crafted Markdown content to any component that renders it without input validation, requiring no additional privileges and deliverable remotely through normal input channels. Immediate patching is recommended.
OpenCVE Enrichment
Github GHSA