{"id":"CVE-2025-9308","details":"A vulnerability has been found in yarnpkg Yarn up to 1.22.22. This impacts the function setOptions of the file src/util/request-manager.js. Such manipulation leads to inefficient regular expression complexity. Local access is required to approach this attack. This vulnerability only affects products that are no longer supported by the maintainer.","modified":"2026-04-10T05:37:12.549679Z","published":"2025-08-21T16:15:35.790Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.320913"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.633486"},{"type":"REPORT","url":"https://github.com/yarnpkg/yarn/pull/9203"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.320913"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yarnpkg/yarn","events":[{"introduced":"0"},{"last_affected":"740c38c3a962c30ddb344a919bbfb7065620714b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.22.22"}]}}],"versions":["1.22.10","1.22.11","pre-release","v0.10.0","v0.11.0","v0.12.0","v0.13.0","v0.14.0","v0.15.0","v0.15.1","v0.17.0","v0.17.0-0","v0.18.0","v0.18.0-0","v0.19.0","v0.19.0-0","v0.20.0","v0.20.0-0","v0.21.0","v0.21.0-pre","v0.22.0","v0.23.0","v0.25.0","v0.26.0","v0.27.0","v0.28.0","v0.7.0","v0.7.1","v0.8.0","v0.9.0","v1.0.0","v1.0.1","v1.0.2","v1.1.0","v1.10.0","v1.11.0","v1.12.0","v1.13.0","v1.14.0","v1.15.0","v1.16.0","v1.17.0","v1.18.0","v1.19.0","v1.2.0","v1.2.1","v1.21.0","v1.22.0","v1.22.1","v1.22.10","v1.22.11","v1.22.12","v1.22.13","v1.22.14","v1.22.15","v1.22.16","v1.22.17","v1.22.18","v1.22.19","v1.22.2","v1.22.20","v1.22.21","v1.22.22","v1.22.3","v1.22.4","v1.22.5","v1.3.0","v1.3.1","v1.3.2","v1.4.0","v1.4.1","v1.5.0","v1.6.0","v1.7.0","v1.8.0","v1.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-9308.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}