Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18766 | PowSyBl Core Contains a Polynomial ReDoS in RegexCriterion |
Github GHSA |
GHSA-8qjw-9xgm-c9ff | PowSyBl Core Contains a Polynomial ReDoS in RegexCriterion |
Fri, 20 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Jun 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PowSyBl (Power System Blocks) is a framework to build power system oriented software. In com.powsybl:powsybl-iidm-criteria versions 6.3.0 to before 6.7.2 and com.powsybl:powsybl-contingency-api versions 5.0.0 to before 6.3.0, there is a a potential polynomial Regular Expression Denial of Service (ReDoS) vulnerability in the RegexCriterion class. This class compiles and evaluates an unvalidated, user-supplied regular expression against the identifier of an Identifiable object via Pattern.compile(regex).matcher(id).find(). If successfully exploited, a malicious actor can cause significant CPU exhaustion through repeated or recursive filter(...) calls — especially if performed over large network models or filtering operations. This issue has been patched in com.powsybl:powsybl-iidm-criteria 6.7.2. | |
| Title | PowSyBl Core Contains a Polynomial ReDoS in RegexCriterion | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-20T17:37:30.252Z
Reserved: 2025-05-15T16:06:40.940Z
Link: CVE-2025-48059
Updated: 2025-06-20T17:37:19.041Z
Status : Deferred
Published: 2025-06-20T17:15:40.560
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-48059
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA