Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wxwx-9fh7-5mrw | cel-rust May Panic During Parsing of Invalid CEL Expressions |
Tue, 14 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | cel-rust is a Common Expression Language interpreter written in Rust. Starting in version 0.10.0 and prior to version 0.11.4, parsing certain malformed CEL expressions can cause the parser to panic, terminating the process. When the crate is used to evaluate untrusted expressions (e.g., user-supplied input over an API), an attacker can send crafted input to trigger a denial of service (DoS). Version 0.11.4 fixes the issue. | |
| Title | cel-rust May Panic During Parsing of Invalid CEL Expressions | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-14T14:16:20.443Z
Reserved: 2025-10-07T16:12:03.424Z
Link: CVE-2025-62162
Updated: 2025-10-14T13:43:28.463Z
Status : Deferred
Published: 2025-10-10T23:15:36.713
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-62162
No data.
OpenCVE Enrichment
No data.
Github GHSA