CVE-2025-3262
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-07

Last updated on: 2025-08-02

Assigner: huntr.dev

Description
A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the huggingface/transformers repository, specifically in version 4.49.0. The vulnerability is due to inefficient regular expression complexity in the `SETTING_RE` variable within the `transformers/commands/chat.py` file. The regex contains repetition groups and non-optimized quantifiers, leading to exponential backtracking when processing 'almost matching' payloads. This can degrade application performance and potentially result in a denial-of-service (DoS) when handling specially crafted input strings. The issue is fixed in version 4.51.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-07
Last Modified
2025-08-02
Generated
2026-05-07
AI Q&A
2025-07-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
huggingface transformers to 4.51.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1333 The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Regular Expression Denial of Service (ReDoS) found in the huggingface/transformers repository version 4.49.0. It occurs because the regular expression in the SETTING_RE variable within the transformers/commands/chat.py file is inefficiently constructed with repetition groups and non-optimized quantifiers. This causes exponential backtracking when processing inputs that almost match the pattern, leading to degraded performance and potential denial-of-service when handling specially crafted input strings.


How can this vulnerability impact me? :

The vulnerability can degrade the performance of the application using the affected version of huggingface/transformers by causing excessive processing time on certain inputs. This can lead to a denial-of-service (DoS) condition, where the application becomes unresponsive or unavailable due to resource exhaustion triggered by specially crafted input strings.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the huggingface/transformers package to version 4.51.0 or later, where the vulnerability has been fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart