Impact
Addressable, a Ruby library for URI handling, contains a bug in its URI template implementation. Two categories of templates construct regular expressions with nested unbounded quantifiers, which trigger exponential backtracking when matching maliciously crafted strings. The resulting CPU and memory exhaustion can bring services to a halt.
Affected Systems
The sporkmonger Addressable library is affected in all releases from 2.3.0 up to, but not including, 2.9.0. These versions remain vulnerable until the fix delivered in 2.9.0, which removes the problematic regex construction.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.5, indicating a moderate to high risk. EPSS data is not available and the issue is not listed in the KEV catalog. The attack vector is inferred to be remote: any application that processes user‑supplied templates or URIs through Addressable can be targeted by sending specially crafted input that causes catastrophic backtracking, resulting in denial of service.
OpenCVE Enrichment
Github GHSA