7.5
CVE-2022-37603
- EPSS 1.16%
- Veröffentlicht 14.10.2022 16:15:12
- Zuletzt bearbeitet 15.05.2025 15:15:56
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js.
Mögliche Gegenmaßnahme
ElasticPress: Update to version 4.4.0, or a newer patched version
Insert Special Characters: Update to version 1.0.6, or a newer patched version
Restricted Site Access: Update to version 7.3.5, or a newer patched version
Simple Page Ordering: Update to version 2.4.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
ElasticPress
Version
* - 4.3.1
SystemWordPress Plugin
≫
Produkt
Insert Special Characters
Version
* - 1.0.5
SystemWordPress Plugin
≫
Produkt
Restricted Site Access
Version
* - 7.3.4
SystemWordPress Plugin
≫
Produkt
Simple Page Ordering
Version
* - 2.4.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Webpack.Js ≫ Loader-utils Version < 1.4.2
Webpack.Js ≫ Loader-utils Version >= 2.0.0 < 2.0.4
Webpack.Js ≫ Loader-utils Version >= 3.0.0 < 3.2.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.16% | 0.78 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-1333 Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.