CVE-2023-26116: Regular Expression Denial of Service (ReDoS) in angular
Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
CVE-2023-26116: Regular Expression Denial of Service (ReDoS) in angular
Description
Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- snyk
- Date Reserved
- 2023-02-20T10:28:48.923Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690904a900ff46172d4a011c
Added to database: 11/3/2025, 7:38:17 PM
Last updated: 11/3/2025, 7:40:08 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-3262: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Best Practical Solutions Request Tracker
MediumCVE-2024-34459: n/a
HighCVE-2024-32663: CWE-400: Uncontrolled Resource Consumption in OISF suricata
HighCVE-2024-32489: n/a
MediumCVE-2024-22641: n/a
HighActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.