{"id":"CVE-2021-28092","details":"The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.","aliases":["GHSA-7r28-3m3f-r2pr"],"modified":"2026-04-02T06:48:38.873470Z","published":"2021-03-12T22:15:14.983Z","references":[{"type":"WEB","url":"https://www.npmjs.com/package/is-svg"},{"type":"ADVISORY","url":"https://github.com/sindresorhus/is-svg/releases"},{"type":"ADVISORY","url":"https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210513-0008/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sindresorhus/is-svg","events":[{"introduced":"f681396a3fb6451558e9c49b72340f0ce92e308c"},{"last_affected":"aa51039b0da7fd97331feabfe433973d2a60a556"},{"fixed":"1f34e79baf3d38984c8de7e1800f3a1bd0c6a09a"}],"database_specific":{"versions":[{"introduced":"2.1.0"},{"last_affected":"4.2.1"}]}}],"versions":["v2.1.0","v3.0.0","v4.0.0","v4.1.0","v4.2.0","v4.2.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-28092.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}