View all vulnerabilities

CVE-2024-52798

path-to-regexp contains a ReDoS

### ImpactThe regular expression that is vulnerable to backtracking can be generated in versions before 0.1.12 of `path-to-regexp`, originally reported in CVE-2024-45296### PatchesUpgrade to 0.1.12.### WorkaroundsAvoid using two parameters within a single path segment, when the separator is not `.` (e.g. no `/:a-:b`). Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.### References- https://github.com/advisories/GHSA-9wv6-86v2-598j- https://blakeembrey.com/posts/2024-09-web-redos/

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Versions
path-to-regexp < 0.1.12
Severity
High
Ecosystem
JavaScript
Publish Date
December 5, 2024
Modified Date
June 3, 2025