All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973 | third party advisory exploit |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657 | third party advisory exploit |
https://github.com/jonschlinkert/word-wrap/blob/master/index.js%23L39 | broken link |
https://github.com/jonschlinkert/word-wrap/releases/tag/1.2.4 | third party advisory |
https://security.netapp.com/advisory/ntap-20240621-0006/ |