{"id":"CVE-2022-25758","details":"All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.","aliases":["GHSA-7mwh-4pqv-wmr8"],"modified":"2026-03-14T11:38:59.454940Z","published":"2022-07-01T20:15:07.847Z","related":["SNYK-JAVA-ORGWEBJARSNPM-2936782","SNYK-JS-SCSSTOKENIZER-2339884"],"references":[{"type":"REPORT","url":"https://github.com/sasstools/scss-tokenizer/issues/45"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-25758.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}