{"id":"CVE-2022-21222","details":"The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.","aliases":["GHSA-p28h-cc7q-c4fg"],"modified":"2026-03-14T11:22:50.256826Z","published":"2022-09-30T05:15:08.713Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/fb55/css-what/blob/a38effd5a8f5506d75c7f8f13cbd8c76248a3860/index.js%23L12"},{"type":"EVIDENCE","url":"https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fb55/css-what","events":[{"introduced":"0"},{"fixed":"2db00ca221922c5b5131d798614aa043f2f6f80e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.1.3"}]}}],"versions":["v0.4.3","v0.4.4","v0.4.5","v0.4.6","v0.4.7","v2.0.0","v2.0.1","v2.0.2","v2.1.0","v2.1.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-21222.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}