Cattown is a JavaScript markdown parser. Versions prior to 1.0.2 used regular expressions with inefficient, potentially exponential worst-case complexity. This could cause excessive CPU usage due to excessive backtracking on crafted inputs. In turn, the excessive CPU usage could lead to resource exhaustion, where processing malicious inputs could cause high CPU or memory usage, potentially leading to denial of service. Version 1.0.2 contains a patch. Additionally, users should review and restrict input sources if untrusted inputs are processed.
Metrics
Affected Vendors & Products
References
History
Tue, 09 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 08 Sep 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cattown is a JavaScript markdown parser. Versions prior to 1.0.2 used regular expressions with inefficient, potentially exponential worst-case complexity. This could cause excessive CPU usage due to excessive backtracking on crafted inputs. In turn, the excessive CPU usage could lead to resource exhaustion, where processing malicious inputs could cause high CPU or memory usage, potentially leading to denial of service. Version 1.0.2 contains a patch. Additionally, users should review and restrict input sources if untrusted inputs are processed. | |
Title | Cattown Vulnerable to Inefficient Regular Expression Complexity and Uncontrolled Resource Consumption | |
Weaknesses | CWE-1333 CWE-400 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-08T22:07:48.516Z
Updated: 2025-09-09T13:30:32.906Z
Reserved: 2025-09-01T20:03:06.533Z
Link: CVE-2025-58451

Updated: 2025-09-09T13:15:49.609Z

Status : Awaiting Analysis
Published: 2025-09-08T22:15:34.780
Modified: 2025-09-09T16:28:43.660
Link: CVE-2025-58451

No data.