Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58050: CWE-125: Out-of-bounds Read in PCRE2Project pcre2

0
Medium
VulnerabilityCVE-2025-58050cvecve-2025-58050cwe-125cwe-122
Published: Wed Aug 27 2025 (08/27/2025, 18:47:35 UTC)
Source: CVE Database V5
Vendor/Project: PCRE2Project
Product: pcre2

Description

The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.

AI-Powered Analysis

AILast updated: 08/27/2025, 19:17:47 UTC

Technical Analysis

CVE-2025-58050 is a medium-severity vulnerability identified in the PCRE2 (Perl Compatible Regular Expressions) library version 10.45. PCRE2 is widely used for regular expression pattern matching in numerous software applications and systems. The vulnerability is a heap-buffer-overflow read issue occurring specifically in the handling of the (*scs:...) (Scan SubString) verb when combined with the (*ACCEPT) verb within the pcre2_match.c source file. This flaw allows an out-of-bounds read during a memcmp operation, potentially causing the application to read memory beyond the allocated buffer. Although this is a read overflow rather than a write, it can lead to information disclosure if the out-of-bounds data influences the final match result in a way observable by an attacker. The vulnerability does not require any privileges or user interaction and can be triggered remotely if an attacker can supply crafted regular expressions or input strings to an application using the vulnerable PCRE2 version. The issue has been addressed and resolved in PCRE2 version 10.46. No known exploits are currently reported in the wild, but the vulnerability's characteristics suggest it could be leveraged for information leakage attacks in affected environments.

Potential Impact

For European organizations, the impact of CVE-2025-58050 primarily concerns confidentiality due to the potential for information disclosure via out-of-bounds memory reads. Organizations that rely on software components or services embedding PCRE2 version 10.45—such as web servers, security tools, data processing applications, or network appliances—may be at risk if these components process untrusted input containing crafted regular expressions. The vulnerability could be exploited to leak sensitive data from memory, which might include cryptographic keys, credentials, or other confidential information, depending on the context of the application. While the vulnerability does not directly affect integrity or availability, the confidentiality breach could lead to further attacks or compliance violations under European data protection regulations such as GDPR. The lack of requirement for authentication or user interaction increases the risk, especially for internet-facing services. However, the absence of known exploits and the medium CVSS score suggest that immediate widespread impact is limited but should not be underestimated.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all software and services using PCRE2 version 10.45 by auditing software inventories, including indirect dependencies in container images and third-party libraries. 2) Prioritize upgrading to PCRE2 version 10.46 or later, which contains the fix for this vulnerability. 3) For software where immediate upgrade is not feasible, implement input validation and sanitization to restrict or block the use of complex regular expressions containing the (*scs:...) and (*ACCEPT) verbs, especially from untrusted sources. 4) Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to detect and block suspicious regular expression patterns that could trigger the vulnerability. 5) Monitor logs and network traffic for anomalous patterns indicative of exploitation attempts. 6) Coordinate with software vendors to ensure timely patching and receive security advisories. 7) Incorporate this vulnerability into incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-22T14:30:32.221Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68af565cad5a09ad0065587f

Added to database: 8/27/2025, 7:02:52 PM

Last enriched: 8/27/2025, 7:17:47 PM

Last updated: 10/12/2025, 5:30:32 PM

Views: 266

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats