CVE-2022-37259
Description
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the string variable in babel.js.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A Regular Expression Denial of Service (ReDoS) vulnerability in stealjs/steal 2.2.4 allows attackers to cause a denial of service via a crafted string in babel.js.
Vulnerability
Overview
The stealjs/steal module loader version 2.2.4 contains a Regular Expression Denial of Service (ReDoS) flaw in its ext/babel.js file. The vulnerability arises from a poorly crafted regular expression that processes the string variable, leading to catastrophic backtracking when a specially crafted input is provided [1][2].
Exploitation
Details
An attacker can exploit this vulnerability by supplying a malicious string that triggers the vulnerable regular expression, causing excessive CPU consumption. The attack does not require authentication if the attacker can control the input processed by babel.js. In typical usage, this would be triggered during module loading or build-time transformation, meaning any application using stealjs/steal to load and process untrusted module code could be affected [1][3].
Impact
Successful exploitation results in a denial of service condition, as the regular expression engine enters exponential backtracking, hanging the Node.js process or significantly degrading performance. This can render the application unresponsive, impacting availability [2].
Mitigation
As of the publication date, the vulnerability exists in stealjs/steal version 2.2.4. Users should review the upstream repository for patches or consider upgrading to a newer version if available [3]. The issue was reported on the project's GitHub issue tracker [1]; however, no official patch release has been confirmed in the advisory. Until a fix is applied, avoid processing untrusted input through the affected regular expression in babel.js.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
stealnpm | <= 2.3.0 | — |
Affected products
2- stealjs/stealdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-rgqx-226f-2xp4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-37259ghsaADVISORY
- github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.jsghsax_refsource_MISCWEB
- github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.jsghsax_refsource_MISCWEB
- github.com/stealjs/steal/issues/1528ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.