CVE-2025-58451
Description
Cattown is a JavaScript markdown parser. Versions prior to 1.0.2 used regular expressions with inefficient, potentially exponential worst-case complexity. This could cause excessive CPU usage due to excessive backtracking on crafted inputs. In turn, the excessive CPU usage could lead to resource exhaustion, where processing malicious inputs could cause high CPU or memory usage, potentially leading to denial of service. Version 1.0.2 contains a patch. Additionally, users should review and restrict input sources if untrusted inputs are processed.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
cattownnpm | < 1.0.2 | 1.0.2 |
Affected products
1Patches
170c2a28fb7dcVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-455v-w7r9-3vv9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-58451ghsaADVISORY
- github.com/IEatUranium238/Cattown/commit/70c2a28fb7dc520cfb7e401e0e141bff3dd26eadnvdWEB
- github.com/IEatUranium238/Cattown/releases/tag/securityghsaWEB
- github.com/IEatUranium238/Cattown/security/advisories/GHSA-455v-w7r9-3vv9nvdWEB
- www.npmjs.com/package/cattownghsaWEB
News mentions
0No linked articles in our index yet.