A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the GPT-NeoX-Japanese model. The vulnerability occurs in the SubWordJapaneseTokenizer class, where regular expressions process specially crafted inputs. The issue stems from a regex exhibiting exponential complexity under certain conditions, leading to excessive backtracking. This can result in high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.48.1 (latest).
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 29 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 29 Apr 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the GPT-NeoX-Japanese model. The vulnerability occurs in the SubWordJapaneseTokenizer class, where regular expressions process specially crafted inputs. The issue stems from a regex exhibiting exponential complexity under certain conditions, leading to excessive backtracking. This can result in high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.48.1 (latest). | |
| Title | Regular Expression Denial of Service (ReDoS) in huggingface/transformers | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-04-29T11:30:38.810Z
Updated: 2025-04-29T13:21:13.446Z
Reserved: 2025-02-10T14:13:43.276Z
Link: CVE-2025-1194
Updated: 2025-04-29T13:21:04.935Z
Status : Analyzed
Published: 2025-04-29T12:15:31.717
Modified: 2025-08-01T21:56:15.790
Link: CVE-2025-1194
No data.