Microsoft Knack 0.12.0 allows Regular expression Denial of Service (ReDoS) in the knack.introspection module. extract_full_summary_from_signature employs an inefficient regular expression pattern: "\s(:param)\s+(.+?)\s:(.*)" that is susceptible to catastrophic backtracking when processing crafted docstrings containing a large volume of whitespace without a terminating colon. An attacker who can control or inject docstring content into affected applications can trigger excessive CPU consumption. This software is used by Azure CLI.
History

Thu, 21 Aug 2025 15:45:00 +0000

Type Values Removed Values Added
Description Microsoft Knack 0.12.0 allows Regular expression Denial of Service (ReDoS) in the knack.introspection module (issue 1 of 2). Microsoft Knack 0.12.0 allows Regular expression Denial of Service (ReDoS) in the knack.introspection module. extract_full_summary_from_signature employs an inefficient regular expression pattern: "\s(:param)\s+(.+?)\s:(.*)" that is susceptible to catastrophic backtracking when processing crafted docstrings containing a large volume of whitespace without a terminating colon. An attacker who can control or inject docstring content into affected applications can trigger excessive CPU consumption. This software is used by Azure CLI.

Thu, 21 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft knack
Vendors & Products Microsoft
Microsoft knack

Thu, 21 Aug 2025 00:00:00 +0000

Type Values Removed Values Added
References

Wed, 20 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 03:00:00 +0000

Type Values Removed Values Added
Description Microsoft Knack 0.12.0 allows Regular expression Denial of Service (ReDoS) in the knack.introspection module (issue 1 of 2).
Weaknesses CWE-1333
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-20T00:00:00.000Z

Updated: 2025-08-21T15:37:24.848Z

Reserved: 2025-07-21T00:00:00.000Z

Link: CVE-2025-54363

cve-icon Vulnrichment

Updated: 2025-08-20T13:37:46.727Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-20T03:15:35.243

Modified: 2025-08-21T16:15:33.693

Link: CVE-2025-54363

cve-icon Redhat

No data.