CVE-2025-4690: CWE-1333 Inefficient Regular Expression Complexity in Google AngularJS
A regular expression used by AngularJS' linky https://docs.angularjs.org/api/ngSanitize/filter/linky filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a Regular expression Denial of Service (ReDoS) https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS attack on the application. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
AI Analysis
Technical Summary
CVE-2025-4690 is a vulnerability identified in Google AngularJS, specifically in the 'linky' filter of the ngSanitize module. The linky filter is designed to detect URLs within input text using a regular expression. However, this regular expression suffers from inefficient complexity due to excessive backtracking, leading to a super-linear runtime when processing specially crafted inputs. This inefficiency can be exploited to perform a Regular Expression Denial of Service (ReDoS) attack, where an attacker submits input that causes the regex engine to consume excessive CPU resources, effectively degrading or denying service to legitimate users. The vulnerability affects all versions of AngularJS, which is notable because AngularJS has reached its End-of-Life (EOL) status and will no longer receive security updates or patches from the maintainers. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack can be launched remotely without privileges but requires user interaction (input submission). The impact is limited to availability degradation, with no direct confidentiality or integrity compromise. No known exploits are currently reported in the wild, and no patches are available due to the project's EOL status. This vulnerability is categorized under CWE-1333, which relates to inefficient regular expression complexity leading to performance issues.
Potential Impact
For European organizations, the primary impact of CVE-2025-4690 is the potential for service disruption through ReDoS attacks targeting web applications that use AngularJS's linky filter. Organizations relying on legacy AngularJS applications, particularly those that process user-generated content with URL detection features, may experience degraded application responsiveness or downtime. This can affect customer-facing services, internal tools, or APIs, leading to operational disruptions and potential reputational damage. Since AngularJS is no longer maintained, organizations cannot rely on official patches, increasing the risk if mitigation is not implemented. The vulnerability does not directly expose sensitive data or allow unauthorized access, but availability impacts can indirectly affect business continuity and user trust. European sectors with high reliance on web applications, such as finance, e-commerce, public services, and telecommunications, could be particularly affected if AngularJS is in use. Additionally, compliance requirements under regulations like GDPR emphasize availability and service reliability, so disruptions could have regulatory implications.
Mitigation Recommendations
Given the lack of official patches due to AngularJS's EOL status, European organizations should adopt a multi-layered mitigation approach: 1) Identify and inventory all applications using AngularJS, especially those utilizing the ngSanitize linky filter. 2) Where feasible, refactor or upgrade applications to use supported frameworks such as Angular (2+) or other modern alternatives that do not suffer from this vulnerability. 3) Implement input validation and sanitization at the server side to limit the size and complexity of user inputs, particularly those that trigger URL detection. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads that may exploit the regex inefficiency. 5) Monitor application performance metrics and logs to detect abnormal CPU usage patterns indicative of ReDoS attempts. 6) Consider rate limiting and CAPTCHA challenges on input forms to reduce automated attack attempts. 7) For legacy systems that cannot be immediately upgraded, isolate them in segmented network zones and restrict exposure to untrusted users. These targeted mitigations go beyond generic advice by focusing on compensating controls and proactive detection tailored to this specific regex-based DoS vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
CVE-2025-4690: CWE-1333 Inefficient Regular Expression Complexity in Google AngularJS
Description
A regular expression used by AngularJS' linky https://docs.angularjs.org/api/ngSanitize/filter/linky filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a Regular expression Denial of Service (ReDoS) https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS attack on the application. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
AI-Powered Analysis
Technical Analysis
CVE-2025-4690 is a vulnerability identified in Google AngularJS, specifically in the 'linky' filter of the ngSanitize module. The linky filter is designed to detect URLs within input text using a regular expression. However, this regular expression suffers from inefficient complexity due to excessive backtracking, leading to a super-linear runtime when processing specially crafted inputs. This inefficiency can be exploited to perform a Regular Expression Denial of Service (ReDoS) attack, where an attacker submits input that causes the regex engine to consume excessive CPU resources, effectively degrading or denying service to legitimate users. The vulnerability affects all versions of AngularJS, which is notable because AngularJS has reached its End-of-Life (EOL) status and will no longer receive security updates or patches from the maintainers. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack can be launched remotely without privileges but requires user interaction (input submission). The impact is limited to availability degradation, with no direct confidentiality or integrity compromise. No known exploits are currently reported in the wild, and no patches are available due to the project's EOL status. This vulnerability is categorized under CWE-1333, which relates to inefficient regular expression complexity leading to performance issues.
Potential Impact
For European organizations, the primary impact of CVE-2025-4690 is the potential for service disruption through ReDoS attacks targeting web applications that use AngularJS's linky filter. Organizations relying on legacy AngularJS applications, particularly those that process user-generated content with URL detection features, may experience degraded application responsiveness or downtime. This can affect customer-facing services, internal tools, or APIs, leading to operational disruptions and potential reputational damage. Since AngularJS is no longer maintained, organizations cannot rely on official patches, increasing the risk if mitigation is not implemented. The vulnerability does not directly expose sensitive data or allow unauthorized access, but availability impacts can indirectly affect business continuity and user trust. European sectors with high reliance on web applications, such as finance, e-commerce, public services, and telecommunications, could be particularly affected if AngularJS is in use. Additionally, compliance requirements under regulations like GDPR emphasize availability and service reliability, so disruptions could have regulatory implications.
Mitigation Recommendations
Given the lack of official patches due to AngularJS's EOL status, European organizations should adopt a multi-layered mitigation approach: 1) Identify and inventory all applications using AngularJS, especially those utilizing the ngSanitize linky filter. 2) Where feasible, refactor or upgrade applications to use supported frameworks such as Angular (2+) or other modern alternatives that do not suffer from this vulnerability. 3) Implement input validation and sanitization at the server side to limit the size and complexity of user inputs, particularly those that trigger URL detection. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads that may exploit the regex inefficiency. 5) Monitor application performance metrics and logs to detect abnormal CPU usage patterns indicative of ReDoS attempts. 6) Consider rate limiting and CAPTCHA challenges on input forms to reduce automated attack attempts. 7) For legacy systems that cannot be immediately upgraded, isolate them in segmented network zones and restrict exposure to untrusted users. These targeted mitigations go beyond generic advice by focusing on compensating controls and proactive detection tailored to this specific regex-based DoS vector.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- HeroDevs
- Date Reserved
- 2025-05-14T15:39:08.634Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a47cffad5a09ad00f80eb7
Added to database: 8/19/2025, 1:32:47 PM
Last enriched: 8/19/2025, 1:48:36 PM
Last updated: 8/20/2025, 12:35:26 AM
Views: 3
Related Threats
CVE-2025-54364: CWE-1333 Inefficient Regular Expression Complexity in Microsoft Knack
MediumCVE-2025-54363: CWE-1333 Inefficient Regular Expression Complexity in Microsoft Knack
MediumCVE-2025-8289: CWE-502 Deserialization of Untrusted Data in themeisle Redirection for Contact Form 7
HighCVE-2025-8145: CWE-502 Deserialization of Untrusted Data in themeisle Redirection for Contact Form 7
HighCVE-2025-8141: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in themeisle Redirection for Contact Form 7
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.