{"id":"CVE-2021-23343","details":"All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.","aliases":["GHSA-hj48-42vr-x3v9"],"modified":"2026-03-14T10:46:51.989552Z","published":"2021-05-04T09:15:07.703Z","related":["ALSA-2021:3623","ALSA-2021:3666","SNYK-JAVA-ORGWEBJARSNPM-1279028","SNYK-JS-PATHPARSE-1077067","SUSE-SU-2022:0531-1","SUSE-SU-2022:0563-1","SUSE-SU-2022:0569-1","SUSE-SU-2022:0570-1","SUSE-SU-2022:0657-1","SUSE-SU-2022:0704-1","SUSE-SU-2022:0715-1","SUSE-SU-2022:1717-1","openSUSE-SU-2022:0657-1","openSUSE-SU-2022:0704-1","openSUSE-SU-2022:0715-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85%40%3Cdev.myfaces.apache.org%3E"},{"type":"REPORT","url":"https://github.com/jbgutierrez/path-parse/issues/8"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jbgutierrez/path-parse","events":[{"introduced":"0"},{"fixed":"9f1db2802ffbc572e6b447f66126697e33b0055e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.0.7"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23343.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}