Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70030: n/a

0
High
VulnerabilityCVE-2025-70030cvecve-2025-70030
Published: Mon Mar 09 2026 (03/09/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue pertaining to CWE-1333: Inefficient Regular Expression Complexity (4.19) was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4.

AI-Powered Analysis

AILast updated: 03/10/2026, 16:22:50 UTC

Technical Analysis

CVE-2025-70030 identifies a vulnerability in Sunbird-Ed portal version 1.13.4 stemming from inefficient regular expression complexity, classified under CWE-1333. This weakness arises when the application uses regular expressions that can exhibit exponential or super-linear time complexity on certain crafted inputs, causing excessive CPU consumption. Such behavior can be exploited by an attacker to trigger denial of service (DoS) conditions by submitting malicious input designed to maximize processing time. The vulnerability does not require authentication or user interaction, increasing its potential risk. However, no known exploits have been reported in the wild to date. The lack of a CVSS score suggests the issue is newly disclosed and pending further analysis. The vulnerability primarily impacts availability by potentially exhausting server resources, leading to service degradation or outages. Sunbird-Ed is an educational platform, so the affected systems are likely deployed in educational institutions or organizations using this software for learning management. The absence of patch links indicates that a fix may not yet be publicly available, emphasizing the need for proactive mitigation and monitoring.

Potential Impact

The primary impact of this vulnerability is on the availability of the Sunbird-Ed portal, as inefficient regular expression evaluation can lead to denial of service through resource exhaustion. Organizations relying on this platform for educational delivery could experience service interruptions, affecting students, educators, and administrative operations. While confidentiality and integrity are not directly impacted, the disruption of service can have cascading effects on organizational productivity and reputation. The ease of exploitation is moderate since it requires crafting specific input to trigger the inefficient regex processing but does not require authentication or user interaction, making remote exploitation feasible. The scope is limited to deployments of Sunbird-Ed version 1.13.4, but given the platform's use in education sectors worldwide, the impact could be significant in those environments. No known exploits in the wild reduce immediate risk, but the vulnerability remains a concern until patched.

Mitigation Recommendations

Organizations should first inventory their use of Sunbird-Ed portal version 1.13.4 to assess exposure. Until a patch is available, implement input validation and sanitization to limit the complexity and length of inputs processed by the application, reducing the risk of triggering inefficient regex evaluation. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns that could exploit this vulnerability. Monitor application performance and logs for unusual spikes in CPU usage or request processing times that may indicate attempted exploitation. Engage with the Sunbird-Ed vendor or community to obtain updates on patches or mitigations. Consider deploying rate limiting on user inputs to prevent abuse. Finally, plan for timely application of patches once released and conduct regression testing to ensure the vulnerability is resolved without impacting functionality.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b044ddea502d3aa8702362

Added to database: 3/10/2026, 4:20:45 PM

Last enriched: 3/10/2026, 4:22:50 PM

Last updated: 3/13/2026, 12:34:22 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses