CVE-2017-16114
Description
The marked module is vulnerable to a regular expression denial of service. Based on the information published in the public issue, 1k characters can block for around 6 seconds.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The marked npm module before 0.3.9 contains a ReDoS vulnerability; 1,000 characters of crafted input cause ~6 seconds of blocking.
Vulnerability
The marked npm module is a Markdown parser and compiler. Versions prior to 0.3.9 contain a regular expression denial of service (ReDoS) vulnerability in the regular expression /^(+)\s*([\s\S]*?[^])\s*\1(?!)/` used when parsing inline code spans [3]. An attacker can craft input that causes catastrophic backtracking, leading to exponential processing time. The issue was publicly reported and confirmed in GitHub issue #937 [3].
Exploitation
An attacker does not need any special privileges or network position beyond the ability to supply Markdown content to the application that uses the marked library. By providing a specially crafted string containing backtick characters and whitespace, the vulnerable regular expression enters a state of excessive backtracking. According to the public issue, a payload of about 1,000 characters can cause the parser to block for approximately 6 seconds [1]. The attacker can repeatedly trigger this to exhaust server resources.
Impact
Successful exploitation causes a denial of service: the Node.js event loop is blocked during the regex evaluation, preventing the application from handling other requests. The impact is limited to availability; no code execution, privilege escalation, or information disclosure occurs. The CVSS v3.1 base score is 7.5 (High) under vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H [1].
Mitigation
Users should upgrade marked to version 0.3.9 or later, which was released to fix the ReDoS vulnerability [2]. No workaround is available; applications processing untrusted Markdown input are strongly advised to update immediately. The CVE-2017-16114 is not listed on the CISA Known Exploited Vulnerabilities catalog as of the publication date.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
markednpm | < 0.3.9 | 0.3.9 |
Affected products
2- HackerOne/marked node modulev5Range: All versions
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-x5pg-88wf-qq4pghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-16114ghsaADVISORY
- github.com/chjj/marked/issues/937ghsax_refsource_MISCWEB
- nodesecurity.io/advisories/531mitrex_refsource_MISC
- www.npmjs.com/advisories/531ghsaWEB
News mentions
0No linked articles in our index yet.