CVE-2025-58451
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-08

Last updated on: 2025-09-09

Assigner: GitHub, Inc.

Description
Cattown is a JavaScript markdown parser. Versions prior to 1.0.2 used regular expressions with inefficient, potentially exponential worst-case complexity. This could cause excessive CPU usage due to excessive backtracking on crafted inputs. In turn, the excessive CPU usage could lead to resource exhaustion, where processing malicious inputs could cause high CPU or memory usage, potentially leading to denial of service. Version 1.0.2 contains a patch. Additionally, users should review and restrict input sources if untrusted inputs are processed.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-08
Last Modified
2025-09-09
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cattown markdown_parser 1.0.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1333 The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Cattown, a JavaScript markdown parser, where versions prior to 1.0.2 use regular expressions that can have inefficient and potentially exponential worst-case complexity. This inefficiency can cause excessive CPU usage due to excessive backtracking when processing specially crafted inputs, leading to resource exhaustion and potentially causing denial of service.


How can this vulnerability impact me? :

The vulnerability can cause excessive CPU or memory usage when processing malicious inputs, which may lead to resource exhaustion and denial of service. This means that an attacker could disrupt the availability of services relying on the vulnerable markdown parser by sending crafted inputs that trigger high resource consumption.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Cattown to version 1.0.2 or later, which contains a patch for this vulnerability. Additionally, review and restrict input sources to avoid processing untrusted inputs that could trigger excessive CPU usage and potential denial of service.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart