Skip to main content

CVE-2025-43880: Inefficient regular expression complexity in GROWI, Inc. GROWI

Medium
VulnerabilityCVE-2025-43880cvecve-2025-43880
Published: Wed Jun 25 2025 (06/25/2025, 05:31:29 UTC)
Source: CVE Database V5
Vendor/Project: GROWI, Inc.
Product: GROWI

Description

Inefficient regular expression complexity issue exists in GROWI prior to v7.1.6. If exploited, a logged-in user may cause a denial of service (DoS) condition.

AI-Powered Analysis

AILast updated: 06/25/2025, 06:04:19 UTC

Technical Analysis

CVE-2025-43880 is a vulnerability identified in GROWI, Inc.'s GROWI software versions prior to 7.1.6. The issue stems from inefficient regular expression complexity within the application, which can be exploited by a logged-in user to trigger a denial of service (DoS) condition. Specifically, the vulnerability arises when the application processes certain inputs that cause the regular expression engine to consume excessive CPU resources, leading to performance degradation or complete service unavailability. This type of vulnerability is commonly referred to as a Regular Expression Denial of Service (ReDoS). The CVSS v3.0 base score is 4.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) reveals that the attack can be launched remotely over the network with low attack complexity, requires the attacker to have some level of privileges (logged-in user), does not require user interaction, and impacts only availability without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or mitigation links were provided in the source data, though the issue is fixed in version 7.1.6 and later. The vulnerability's impact is limited to denial of service, which could disrupt normal operations of GROWI instances, potentially affecting collaboration and documentation workflows dependent on this platform.

Potential Impact

For European organizations using GROWI, particularly those relying on it for internal documentation, knowledge sharing, or collaborative workflows, this vulnerability poses a risk of service disruption. A successful exploitation could degrade system responsiveness or cause outages, impacting productivity and potentially delaying critical business processes. Since the attack requires authenticated access, the threat is primarily from insider threats or compromised user accounts. Organizations with large user bases or those integrating GROWI into critical operational environments may experience amplified effects. The denial of service could also affect regulatory compliance if documentation access is mandated for audit or operational continuity. However, the lack of impact on confidentiality or integrity reduces risks related to data breaches or manipulation. The medium severity suggests that while the threat is not critical, it should not be ignored, especially in environments where availability is crucial.

Mitigation Recommendations

Upgrade GROWI installations to version 7.1.6 or later, where this vulnerability is addressed. Implement strict access controls and monitor user activities to detect unusual patterns that may indicate attempts to exploit the vulnerability. Apply rate limiting or input validation on user-submitted content to reduce the risk of triggering inefficient regular expressions. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting regular expression processing. Conduct regular security audits and vulnerability scans focusing on GROWI deployments to identify outdated versions or misconfigurations. Educate users on secure usage practices and the importance of safeguarding their credentials to prevent unauthorized access. Consider isolating GROWI instances in segmented network zones to limit the impact of potential DoS attacks on broader infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-06-13T01:56:06.794Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 685b8ddc66faf0c1de3bc61d

Added to database: 6/25/2025, 5:49:16 AM

Last enriched: 6/25/2025, 6:04:19 AM

Last updated: 6/25/2025, 7:55:35 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats