Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

5 vulnerabilities found for fedify by fedify

CVE-2026-34148 (GCVE-0-2026-34148)

Vulnerability from nvd – Published: 2026-04-06 15:06 – Updated: 2026-04-07 14:25
VLAI?
Title
Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution
Summary
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to 1.9.6, 1.10.5, 2.0.8, and 2.1.1, @fedify/fedify follows HTTP redirects recursively in its remote document loader and authenticated document loader without enforcing a maximum redirect count or visited-URL loop detection. An attacker who controls a remote ActivityPub key or actor URL can force a server using Fedify to make repeated outbound requests from a single inbound request, leading to resource consumption and denial of service. This vulnerability is fixed in 1.9.6, 1.10.5, 2.0.8, and 2.1.1.
CWE
  • CWE-400 - Uncontrolled Resource Consumption
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
Impacted products
Vendor Product Version
@fedify fedify Affected: < 1.9.6
Affected: >= 1.10.0, < 1.10.5
Affected: >= 2.0.0, < 2.0.8
Affected: >= 2.1.0, < 2.1.1
Create a notification for this product.
    @fedify vocab-runtime Affected: < 2.0.8
Affected: >= 2.1.0, < 2.1.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-34148",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-06T15:35:17.193226Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-06T15:35:21.840Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-gm9m-gwc4-hwgp"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "fedify",
          "vendor": "@fedify",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.9.6"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.10.0, \u003c 1.10.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.0.0, \u003c 2.0.8"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.1.0, \u003c 2.1.1"
            }
          ]
        },
        {
          "product": "vocab-runtime",
          "vendor": "@fedify",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.0.8"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.1.0, \u003c 2.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to 1.9.6, 1.10.5, 2.0.8, and 2.1.1, @fedify/fedify follows HTTP redirects recursively in its remote document loader and authenticated document loader without enforcing a maximum redirect count or visited-URL loop detection. An attacker who controls a remote ActivityPub key or actor URL can force a server using Fedify to make repeated outbound requests from a single inbound request, leading to resource consumption and denial of service. This vulnerability is fixed in 1.9.6, 1.10.5, 2.0.8, and 2.1.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400: Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770: Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-07T14:25:51.368Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-gm9m-gwc4-hwgp",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-gm9m-gwc4-hwgp"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.10.5",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.10.5"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.9.6",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.9.6"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/2.0.8",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/2.0.8"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/2.1.1",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/2.1.1"
        }
      ],
      "source": {
        "advisory": "GHSA-gm9m-gwc4-hwgp",
        "discovery": "UNKNOWN"
      },
      "title": "Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-34148",
    "datePublished": "2026-04-06T15:06:53.197Z",
    "dateReserved": "2026-03-25T20:12:04.195Z",
    "dateUpdated": "2026-04-07T14:25:51.368Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-68475 (GCVE-0-2025-68475)

Vulnerability from nvd – Published: 2025-12-22 21:31 – Updated: 2025-12-22 21:54
VLAI?
Title
Fedify has ReDoS Vulnerability in HTML Parsing Regex
Summary
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
CWE
  • CWE-1333 - Inefficient Regular Expression Complexity
Assigner
Impacted products
Vendor Product Version
fedify-dev fedify Affected: < 1.6.13
Affected: >= 1.7.0, < 1.7.14
Affected: >= 1.8.0, < 1.8.15
Affected: >= 1.9.0, < 1.9.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-68475",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-22T21:54:29.525857Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-22T21:54:45.635Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "fedify",
          "vendor": "fedify-dev",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.6.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.7.0, \u003c 1.7.14"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.8.0, \u003c 1.8.15"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.9.0, \u003c 1.9.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify\u0027s document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1333",
              "description": "CWE-1333: Inefficient Regular Expression Complexity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-22T21:31:20.314Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/commit/2bdcb24d7d6d5886e0214ed504b63a6dc5488779",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/commit/2bdcb24d7d6d5886e0214ed504b63a6dc5488779"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/commit/bf2f0783634efed2663d1b187dc55461ee1f987a",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/commit/bf2f0783634efed2663d1b187dc55461ee1f987a"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.6.13",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.6.13"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.7.14",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.7.14"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.8.15",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.8.15"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.9.2",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.9.2"
        }
      ],
      "source": {
        "advisory": "GHSA-rchf-xwx2-hm93",
        "discovery": "UNKNOWN"
      },
      "title": "Fedify has ReDoS Vulnerability in HTML Parsing Regex"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-68475",
    "datePublished": "2025-12-22T21:31:20.314Z",
    "dateReserved": "2025-12-18T13:52:15.491Z",
    "dateUpdated": "2025-12-22T21:54:45.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-34148 (GCVE-0-2026-34148)

Vulnerability from cvelistv5 – Published: 2026-04-06 15:06 – Updated: 2026-04-07 14:25
VLAI?
Title
Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution
Summary
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to 1.9.6, 1.10.5, 2.0.8, and 2.1.1, @fedify/fedify follows HTTP redirects recursively in its remote document loader and authenticated document loader without enforcing a maximum redirect count or visited-URL loop detection. An attacker who controls a remote ActivityPub key or actor URL can force a server using Fedify to make repeated outbound requests from a single inbound request, leading to resource consumption and denial of service. This vulnerability is fixed in 1.9.6, 1.10.5, 2.0.8, and 2.1.1.
CWE
  • CWE-400 - Uncontrolled Resource Consumption
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
Impacted products
Vendor Product Version
@fedify fedify Affected: < 1.9.6
Affected: >= 1.10.0, < 1.10.5
Affected: >= 2.0.0, < 2.0.8
Affected: >= 2.1.0, < 2.1.1
Create a notification for this product.
    @fedify vocab-runtime Affected: < 2.0.8
Affected: >= 2.1.0, < 2.1.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-34148",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-06T15:35:17.193226Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-06T15:35:21.840Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-gm9m-gwc4-hwgp"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "fedify",
          "vendor": "@fedify",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.9.6"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.10.0, \u003c 1.10.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.0.0, \u003c 2.0.8"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.1.0, \u003c 2.1.1"
            }
          ]
        },
        {
          "product": "vocab-runtime",
          "vendor": "@fedify",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.0.8"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.1.0, \u003c 2.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to 1.9.6, 1.10.5, 2.0.8, and 2.1.1, @fedify/fedify follows HTTP redirects recursively in its remote document loader and authenticated document loader without enforcing a maximum redirect count or visited-URL loop detection. An attacker who controls a remote ActivityPub key or actor URL can force a server using Fedify to make repeated outbound requests from a single inbound request, leading to resource consumption and denial of service. This vulnerability is fixed in 1.9.6, 1.10.5, 2.0.8, and 2.1.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400: Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770: Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-07T14:25:51.368Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-gm9m-gwc4-hwgp",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-gm9m-gwc4-hwgp"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.10.5",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.10.5"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.9.6",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.9.6"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/2.0.8",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/2.0.8"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/2.1.1",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/2.1.1"
        }
      ],
      "source": {
        "advisory": "GHSA-gm9m-gwc4-hwgp",
        "discovery": "UNKNOWN"
      },
      "title": "Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-34148",
    "datePublished": "2026-04-06T15:06:53.197Z",
    "dateReserved": "2026-03-25T20:12:04.195Z",
    "dateUpdated": "2026-04-07T14:25:51.368Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-68475 (GCVE-0-2025-68475)

Vulnerability from cvelistv5 – Published: 2025-12-22 21:31 – Updated: 2025-12-22 21:54
VLAI?
Title
Fedify has ReDoS Vulnerability in HTML Parsing Regex
Summary
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
CWE
  • CWE-1333 - Inefficient Regular Expression Complexity
Assigner
Impacted products
Vendor Product Version
fedify-dev fedify Affected: < 1.6.13
Affected: >= 1.7.0, < 1.7.14
Affected: >= 1.8.0, < 1.8.15
Affected: >= 1.9.0, < 1.9.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-68475",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-22T21:54:29.525857Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-22T21:54:45.635Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "fedify",
          "vendor": "fedify-dev",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.6.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.7.0, \u003c 1.7.14"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.8.0, \u003c 1.8.15"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.9.0, \u003c 1.9.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify\u0027s document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1333",
              "description": "CWE-1333: Inefficient Regular Expression Complexity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-22T21:31:20.314Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/commit/2bdcb24d7d6d5886e0214ed504b63a6dc5488779",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/commit/2bdcb24d7d6d5886e0214ed504b63a6dc5488779"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/commit/bf2f0783634efed2663d1b187dc55461ee1f987a",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/commit/bf2f0783634efed2663d1b187dc55461ee1f987a"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.6.13",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.6.13"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.7.14",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.7.14"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.8.15",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.8.15"
        },
        {
          "name": "https://github.com/fedify-dev/fedify/releases/tag/1.9.2",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/fedify-dev/fedify/releases/tag/1.9.2"
        }
      ],
      "source": {
        "advisory": "GHSA-rchf-xwx2-hm93",
        "discovery": "UNKNOWN"
      },
      "title": "Fedify has ReDoS Vulnerability in HTML Parsing Regex"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-68475",
    "datePublished": "2025-12-22T21:31:20.314Z",
    "dateReserved": "2025-12-18T13:52:15.491Z",
    "dateUpdated": "2025-12-22T21:54:45.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

FKIE_CVE-2025-68475

Vulnerability from fkie_nvd - Published: 2025-12-22 22:16 - Updated: 2026-03-17 19:39
Summary
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Impacted products
Vendor Product Version
fedify fedify *
fedify fedify *
fedify fedify *
fedify fedify *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:fedify:fedify:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F097114-F157-4FE4-9CB8-2BAA384C5B30",
              "versionEndExcluding": "1.6.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fedify:fedify:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9267FB8-A2C3-4269-A895-703ACA0C7078",
              "versionEndExcluding": "1.7.14",
              "versionStartIncluding": "1.7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fedify:fedify:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE0DA7-B892-4C34-B4F6-9B413A1A896F",
              "versionEndExcluding": "1.8.15",
              "versionStartIncluding": "1.8.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fedify:fedify:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEFCAFFE-AFCB-468E-8F32-63B8205A39DA",
              "versionEndExcluding": "1.9.2",
              "versionStartIncluding": "1.9.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify\u0027s document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2."
    }
  ],
  "id": "CVE-2025-68475",
  "lastModified": "2026-03-17T19:39:32.477",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-12-22T22:16:09.143",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/fedify-dev/fedify/commit/2bdcb24d7d6d5886e0214ed504b63a6dc5488779"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/fedify-dev/fedify/commit/bf2f0783634efed2663d1b187dc55461ee1f987a"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product",
        "Release Notes"
      ],
      "url": "https://github.com/fedify-dev/fedify/releases/tag/1.6.13"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product",
        "Release Notes"
      ],
      "url": "https://github.com/fedify-dev/fedify/releases/tag/1.7.14"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product",
        "Release Notes"
      ],
      "url": "https://github.com/fedify-dev/fedify/releases/tag/1.8.15"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product",
        "Release Notes"
      ],
      "url": "https://github.com/fedify-dev/fedify/releases/tag/1.9.2"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1333"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}