CVE-2025-66020: CWE-1333: Inefficient Regular Expression Complexity in open-circle valibot
Valibot helps validate data using a schema. In versions from 0.31.0 to 1.1.0, the EMOJI_REGEX used in the emoji action is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. A short, maliciously crafted string (e.g., <100 characters) can cause the regex engine to consume excessive CPU time (minutes), leading to a Denial of Service (DoS) for the application. This issue has been patched in version 1.2.0.
AI Analysis
Technical Summary
Valibot is a schema-based data validation library developed by open-circle, widely used to ensure data integrity in applications. Versions 0.31.0 through 1.1.0 contain a vulnerability identified as CVE-2025-66020, classified under CWE-1333 (Inefficient Regular Expression Complexity). The vulnerability stems from the EMOJI_REGEX pattern used in the emoji validation action, which is susceptible to Regular Expression Denial of Service (ReDoS). A maliciously crafted input string, typically fewer than 100 characters, can cause catastrophic backtracking in the regex engine, leading to excessive CPU usage and effectively a denial of service condition for the host application. This attack vector requires no privileges or user interaction and can be triggered remotely by submitting specially crafted input to any service relying on the vulnerable valibot versions for emoji validation. The vulnerability has been assigned a CVSS v3.1 score of 7.5 (high severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability (denial of service). The issue was publicly disclosed on November 26, 2025, and patched in valibot version 1.2.0. No known exploits are currently reported in the wild, but the simplicity of the attack and the widespread use of valibot in JavaScript/Node.js environments make it a credible threat. Organizations using valibot for input validation, especially those processing emoji or user-generated content, should consider this vulnerability critical to address to avoid service disruptions.
Potential Impact
For European organizations, the primary impact of CVE-2025-66020 is service availability degradation or denial due to excessive CPU consumption triggered by crafted input. This can lead to application downtime, degraded user experience, and potential cascading failures in dependent systems. Organizations providing web services, APIs, or platforms that validate user input with valibot are at risk of targeted or opportunistic ReDoS attacks, which could be leveraged to disrupt business operations or cause reputational damage. In sectors such as finance, healthcare, and critical infrastructure, where availability is paramount, this vulnerability could have severe operational consequences. Additionally, the attack could be used as a smokescreen for other malicious activities by distracting security teams. Although confidentiality and integrity are not directly impacted, the denial of service effect can indirectly affect business continuity and compliance with service level agreements (SLAs).
Mitigation Recommendations
The most effective mitigation is to upgrade all instances of valibot to version 1.2.0 or later, where the EMOJI_REGEX vulnerability has been patched. Organizations should audit their codebases and dependencies to identify usage of valibot versions between 0.31.0 and 1.1.0. If immediate upgrading is not feasible, implementing input validation rate limiting and anomaly detection on inputs containing emojis can reduce the risk of exploitation. Additionally, deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspiciously crafted emoji inputs may help mitigate attacks. Developers should avoid relying solely on regex-based emoji validation and consider alternative validation methods that do not involve complex regex patterns. Monitoring CPU usage and application performance metrics for unusual spikes can provide early warning signs of exploitation attempts. Finally, educating development teams about ReDoS risks and secure regex practices will help prevent similar vulnerabilities in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-66020: CWE-1333: Inefficient Regular Expression Complexity in open-circle valibot
Description
Valibot helps validate data using a schema. In versions from 0.31.0 to 1.1.0, the EMOJI_REGEX used in the emoji action is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. A short, maliciously crafted string (e.g., <100 characters) can cause the regex engine to consume excessive CPU time (minutes), leading to a Denial of Service (DoS) for the application. This issue has been patched in version 1.2.0.
AI-Powered Analysis
Technical Analysis
Valibot is a schema-based data validation library developed by open-circle, widely used to ensure data integrity in applications. Versions 0.31.0 through 1.1.0 contain a vulnerability identified as CVE-2025-66020, classified under CWE-1333 (Inefficient Regular Expression Complexity). The vulnerability stems from the EMOJI_REGEX pattern used in the emoji validation action, which is susceptible to Regular Expression Denial of Service (ReDoS). A maliciously crafted input string, typically fewer than 100 characters, can cause catastrophic backtracking in the regex engine, leading to excessive CPU usage and effectively a denial of service condition for the host application. This attack vector requires no privileges or user interaction and can be triggered remotely by submitting specially crafted input to any service relying on the vulnerable valibot versions for emoji validation. The vulnerability has been assigned a CVSS v3.1 score of 7.5 (high severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability (denial of service). The issue was publicly disclosed on November 26, 2025, and patched in valibot version 1.2.0. No known exploits are currently reported in the wild, but the simplicity of the attack and the widespread use of valibot in JavaScript/Node.js environments make it a credible threat. Organizations using valibot for input validation, especially those processing emoji or user-generated content, should consider this vulnerability critical to address to avoid service disruptions.
Potential Impact
For European organizations, the primary impact of CVE-2025-66020 is service availability degradation or denial due to excessive CPU consumption triggered by crafted input. This can lead to application downtime, degraded user experience, and potential cascading failures in dependent systems. Organizations providing web services, APIs, or platforms that validate user input with valibot are at risk of targeted or opportunistic ReDoS attacks, which could be leveraged to disrupt business operations or cause reputational damage. In sectors such as finance, healthcare, and critical infrastructure, where availability is paramount, this vulnerability could have severe operational consequences. Additionally, the attack could be used as a smokescreen for other malicious activities by distracting security teams. Although confidentiality and integrity are not directly impacted, the denial of service effect can indirectly affect business continuity and compliance with service level agreements (SLAs).
Mitigation Recommendations
The most effective mitigation is to upgrade all instances of valibot to version 1.2.0 or later, where the EMOJI_REGEX vulnerability has been patched. Organizations should audit their codebases and dependencies to identify usage of valibot versions between 0.31.0 and 1.1.0. If immediate upgrading is not feasible, implementing input validation rate limiting and anomaly detection on inputs containing emojis can reduce the risk of exploitation. Additionally, deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspiciously crafted emoji inputs may help mitigate attacks. Developers should avoid relying solely on regex-based emoji validation and consider alternative validation methods that do not involve complex regex patterns. Monitoring CPU usage and application performance metrics for unusual spikes can provide early warning signs of exploitation attempts. Finally, educating development teams about ReDoS risks and secure regex practices will help prevent similar vulnerabilities in the future.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-21T01:08:02.613Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69265f3eca41832e1e61653a
Added to database: 11/26/2025, 2:00:30 AM
Last enriched: 12/3/2025, 4:29:21 AM
Last updated: 1/19/2026, 9:58:47 AM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1148: Cross-Site Request Forgery in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1147: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1146: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-59355: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache Linkis
UnknownCVE-2025-29847: CWE-20 Improper Input Validation in Apache Software Foundation Apache Linkis
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.