CVE-2025-58050: CWE-125: Out-of-bounds Read in PCRE2Project pcre2
The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.
AI Analysis
Technical Summary
CVE-2025-58050 is a medium-severity vulnerability identified in the PCRE2 (Perl Compatible Regular Expressions) library version 10.45. PCRE2 is widely used for regular expression pattern matching in numerous software applications and systems. The vulnerability is a heap-buffer-overflow read issue occurring specifically in the handling of the (*scs:...) (Scan SubString) verb when combined with the (*ACCEPT) verb within the pcre2_match.c source file. This flaw allows an out-of-bounds read during a memcmp operation, potentially causing the application to read memory beyond the allocated buffer. Although this is a read overflow rather than a write, it can lead to information disclosure if the out-of-bounds data influences the final match result in a way observable by an attacker. The vulnerability does not require any privileges or user interaction and can be triggered remotely if an attacker can supply crafted regular expressions or input strings to an application using the vulnerable PCRE2 version. The issue has been addressed and resolved in PCRE2 version 10.46. No known exploits are currently reported in the wild, but the vulnerability's characteristics suggest it could be leveraged for information leakage attacks in affected environments.
Potential Impact
For European organizations, the impact of CVE-2025-58050 primarily concerns confidentiality due to the potential for information disclosure via out-of-bounds memory reads. Organizations that rely on software components or services embedding PCRE2 version 10.45—such as web servers, security tools, data processing applications, or network appliances—may be at risk if these components process untrusted input containing crafted regular expressions. The vulnerability could be exploited to leak sensitive data from memory, which might include cryptographic keys, credentials, or other confidential information, depending on the context of the application. While the vulnerability does not directly affect integrity or availability, the confidentiality breach could lead to further attacks or compliance violations under European data protection regulations such as GDPR. The lack of requirement for authentication or user interaction increases the risk, especially for internet-facing services. However, the absence of known exploits and the medium CVSS score suggest that immediate widespread impact is limited but should not be underestimated.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify all software and services using PCRE2 version 10.45 by auditing software inventories, including indirect dependencies in container images and third-party libraries. 2) Prioritize upgrading to PCRE2 version 10.46 or later, which contains the fix for this vulnerability. 3) For software where immediate upgrade is not feasible, implement input validation and sanitization to restrict or block the use of complex regular expressions containing the (*scs:...) and (*ACCEPT) verbs, especially from untrusted sources. 4) Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to detect and block suspicious regular expression patterns that could trigger the vulnerability. 5) Monitor logs and network traffic for anomalous patterns indicative of exploitation attempts. 6) Coordinate with software vendors to ensure timely patching and receive security advisories. 7) Incorporate this vulnerability into incident response plans to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-58050: CWE-125: Out-of-bounds Read in PCRE2Project pcre2
Description
The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.
AI-Powered Analysis
Technical Analysis
CVE-2025-58050 is a medium-severity vulnerability identified in the PCRE2 (Perl Compatible Regular Expressions) library version 10.45. PCRE2 is widely used for regular expression pattern matching in numerous software applications and systems. The vulnerability is a heap-buffer-overflow read issue occurring specifically in the handling of the (*scs:...) (Scan SubString) verb when combined with the (*ACCEPT) verb within the pcre2_match.c source file. This flaw allows an out-of-bounds read during a memcmp operation, potentially causing the application to read memory beyond the allocated buffer. Although this is a read overflow rather than a write, it can lead to information disclosure if the out-of-bounds data influences the final match result in a way observable by an attacker. The vulnerability does not require any privileges or user interaction and can be triggered remotely if an attacker can supply crafted regular expressions or input strings to an application using the vulnerable PCRE2 version. The issue has been addressed and resolved in PCRE2 version 10.46. No known exploits are currently reported in the wild, but the vulnerability's characteristics suggest it could be leveraged for information leakage attacks in affected environments.
Potential Impact
For European organizations, the impact of CVE-2025-58050 primarily concerns confidentiality due to the potential for information disclosure via out-of-bounds memory reads. Organizations that rely on software components or services embedding PCRE2 version 10.45—such as web servers, security tools, data processing applications, or network appliances—may be at risk if these components process untrusted input containing crafted regular expressions. The vulnerability could be exploited to leak sensitive data from memory, which might include cryptographic keys, credentials, or other confidential information, depending on the context of the application. While the vulnerability does not directly affect integrity or availability, the confidentiality breach could lead to further attacks or compliance violations under European data protection regulations such as GDPR. The lack of requirement for authentication or user interaction increases the risk, especially for internet-facing services. However, the absence of known exploits and the medium CVSS score suggest that immediate widespread impact is limited but should not be underestimated.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify all software and services using PCRE2 version 10.45 by auditing software inventories, including indirect dependencies in container images and third-party libraries. 2) Prioritize upgrading to PCRE2 version 10.46 or later, which contains the fix for this vulnerability. 3) For software where immediate upgrade is not feasible, implement input validation and sanitization to restrict or block the use of complex regular expressions containing the (*scs:...) and (*ACCEPT) verbs, especially from untrusted sources. 4) Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to detect and block suspicious regular expression patterns that could trigger the vulnerability. 5) Monitor logs and network traffic for anomalous patterns indicative of exploitation attempts. 6) Coordinate with software vendors to ensure timely patching and receive security advisories. 7) Incorporate this vulnerability into incident response plans to quickly address any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-22T14:30:32.221Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68af565cad5a09ad0065587f
Added to database: 8/27/2025, 7:02:52 PM
Last enriched: 8/27/2025, 7:17:47 PM
Last updated: 8/28/2025, 4:39:32 AM
Views: 8
Related Threats
CVE-2025-8073: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in plugincy Dynamic AJAX Product Filters for WooCommerce
MediumCVE-2025-6255: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in plugincy Dynamic AJAX Product Filters for WooCommerce
MediumCVE-2025-7956: CWE-862 Missing Authorization in wpdreams Ajax Search Lite – Live Search & Filter
MediumCVE-2025-7955: CWE-287 Improper Authentication in pbmacintyre RingCentral Communications Plugin – FREE
CriticalCVE-2025-8977: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in mra13 Simple Download Monitor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.