Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25290: CWE-1333: Inefficient Regular Expression Complexity in octokit request.js

0
Medium
VulnerabilityCVE-2025-25290cvecve-2025-25290cwe-1333
Published: Fri Feb 14 2025 (02/14/2025, 19:37:47 UTC)
Source: CVE Database V5
Vendor/Project: octokit
Product: request.js

Description

CVE-2025-25290 is a Regular Expression Denial of Service (ReDoS) vulnerability in the octokit request. js library versions from 1. 0. 0 up to but not including 9. 2. 1. The flaw lies in an inefficient regex used to parse the HTTP 'link' header, which can be exploited by sending a maliciously crafted header to cause excessive CPU consumption. This results in degraded service availability or server unresponsiveness. The vulnerability does not affect confidentiality or integrity and requires no authentication or user interaction to exploit. Fixed versions 9.

AI-Powered Analysis

AILast updated: 01/16/2026, 18:06:14 UTC

Technical Analysis

CVE-2025-25290 is a medium-severity vulnerability classified under CWE-1333, involving inefficient regular expression complexity in the octokit request.js library. Octokit is a widely used JavaScript library for sending parameterized requests to GitHub's APIs, commonly employed in both browser and Node.js environments. The vulnerability exists in versions starting from 1.0.0 up to but excluding 9.2.1 and 8.4.1, where the regex pattern `/<([^>]+)>; rel="deprecation"/` is used to parse the HTTP 'link' header in API responses. This regex is vulnerable to catastrophic backtracking due to its unbounded matching behavior, which can be triggered by specially crafted malicious input. An attacker can exploit this by sending a maliciously crafted 'link' header to a server or client using the vulnerable octokit versions, causing the regex engine to consume excessive CPU resources. This leads to a denial of service condition by making the affected service unresponsive or significantly degraded in performance. The vulnerability affects availability only, with no direct impact on confidentiality or integrity. Exploitation requires no authentication or user interaction, making it remotely exploitable over the network. The issue was addressed in octokit versions 9.2.1 and 8.4.1, which updated the regex to prevent catastrophic backtracking. No known exploits have been reported in the wild as of the publication date. This vulnerability is particularly relevant for services and applications that rely on octokit request.js to interact with GitHub APIs, including CI/CD pipelines, developer tools, and automation scripts.

Potential Impact

For European organizations, the primary impact of CVE-2025-25290 is on service availability. Organizations that integrate octokit request.js in their development workflows, automation tools, or backend services communicating with GitHub APIs may experience denial of service conditions if targeted with maliciously crafted HTTP headers. This can disrupt software development processes, continuous integration pipelines, and automated deployments, potentially causing delays and operational downtime. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect business continuity and developer productivity. Organizations with large-scale software development operations or those providing developer tooling services are at higher risk. Additionally, cloud-based services or SaaS platforms that incorporate octokit request.js might face customer impact due to service degradation. The absence of authentication requirements for exploitation increases the attack surface, allowing remote attackers to trigger the issue without prior access. However, the lack of known exploits in the wild suggests limited immediate threat but warrants proactive mitigation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-25290, European organizations should: 1) Upgrade all instances of octokit request.js to version 9.2.1 or later, or 8.4.1 or later, where the regex vulnerability is fixed. 2) Implement input validation and sanitization on HTTP headers, particularly the 'link' header, to detect and reject suspicious or malformed inputs that could trigger regex backtracking. 3) Employ rate limiting and anomaly detection on API endpoints or services that process GitHub API responses to reduce the risk of resource exhaustion attacks. 4) Monitor application logs and performance metrics for unusual CPU spikes or slowdowns during API interactions that could indicate attempted exploitation. 5) For critical infrastructure, consider isolating or sandboxing components that parse external HTTP headers to limit the impact of potential DoS attacks. 6) Educate development teams about the risks of ReDoS vulnerabilities and encourage secure coding practices when handling untrusted input. 7) Review and update dependency management policies to ensure timely patching of third-party libraries. These measures collectively reduce the likelihood and impact of exploitation beyond simply upgrading the vulnerable library.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-02-06T17:13:33.122Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696a7aa9b22c7ad868c5764f

Added to database: 1/16/2026, 5:51:37 PM

Last enriched: 1/16/2026, 6:06:14 PM

Last updated: 1/16/2026, 7:35:27 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats