VYPR
High severityNVD Advisory· Published Sep 15, 2022· Updated Aug 3, 2024

CVE-2022-37260

CVE-2022-37260

Description

A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the input variable in main.js.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A ReDoS vulnerability in stealjs steal 2.2.4 allows attackers to cause a denial of service via crafted input.

A Regular Expression Denial of Service (ReDoS) vulnerability exists in stealjs steal version 2.2.4. The issue is located in the main.js file, where a regular expression in the input variable suffers from catastrophic backtracking, leading to excessive CPU consumption when processing crafted input [1][2][4].

An attacker can exploit this by providing a specially crafted string to the module loader's input, triggering the vulnerable regex pattern. No authentication is required if the application processes untrusted input, making the attack surface accessible over the network [2].

The impact is a denial of service condition, where the CPU becomes saturated, potentially causing the application to become unresponsive. This can disrupt service availability for legitimate users [1][2].

As of the advisory, the vendor was notified and the issue is documented on the project's GitHub page. Users are advised to monitor the repository for a patched release and apply input validation as a temporary workaround [1][2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
stealnpm
<= 2.3.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.