GHSA-8qjw-9xgm-c9ff

Suggest an improvement
Source
https://github.com/advisories/GHSA-8qjw-9xgm-c9ff
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-8qjw-9xgm-c9ff/GHSA-8qjw-9xgm-c9ff.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-8qjw-9xgm-c9ff
Aliases
Published
2025-06-19T16:19:48Z
Modified
2025-06-20T23:24:23.753639Z
Severity
  • 2.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
PowSyBl Core Contains a Polynomial ReDoS in RegexCriterion
Details

Impact

What kind of vulnerability is it? Who is impacted?

This is an advisory for a potential polynomial Regular Expression Denial of Service (ReDoS) vulnerability in the RegexCriterion class. This class compiles and evaluates an unvalidated, user-supplied regular expression against the identifier of an Identifiable object via Pattern.compile(regex).matcher(id).find().

To trigger polynomial ReDoS in RegexCriterion, two attacker-controlled conditions must be met: - Control over the regex input passed into the constructor: - Example: An attacker supplies a malicious pattern such as (.*a){10000}. - Control or influence over the output of Identifiable.getId(): - Example: A long string like "aaaa...!" that forces excessive backtracking.

If both conditions are satisfied, a malicious actor can cause significant CPU exhaustion through repeated or recursive filter(...) calls — especially if performed over large network models or filtering operations. While this class does not handle file or memory data directly, its reliance on untrusted regular expressions and potentially attacker-controlled identifiers makes it vulnerable to polynomial ReDoS under the right conditions. This risk is amplified when the library is used in dynamic or scriptable environments where external users control either criterion construction or network object identifiers. Although not as dangerous as catastrophic exponential ReDoS, the polynomial pattern still induces significant performance degradation as input size increases.

Am I impacted?

Since RegexCriterion are used to define contingencies or limit reductions, you are vulnerable if: - you allow untrusted users to define contingency lists or limit reductions using this criterion; - OR you load untrusted contingencies or limit reductions files

AND use them with a network containing untrusted identifiers.

Patches

com.powsybl:powsybl-iidm-criteria:6.7.2 and higher

References

powsybl-core v6.7.2

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2025-06-20T17:15:40Z",
    "severity": "LOW",
    "cwe_ids": [
        "CWE-1333"
    ],
    "github_reviewed_at": "2025-06-19T16:19:48Z"
}
References

Affected packages

Maven / com.powsybl:powsybl-iidm-criteria

Package

Name
com.powsybl:powsybl-iidm-criteria
View open source insights on deps.dev
Purl
pkg:maven/com.powsybl/powsybl-iidm-criteria

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.7.2

Affected versions

6.*

6.3.0
6.3.1
6.3.2
6.4.0-RC2
6.4.0
6.4.1
6.5.0-RC1
6.5.0
6.5.1
6.6.0-RC1
6.6.0
6.6.1
6.7.0-RC1
6.7.0
6.7.1

Database specific

{
    "last_known_affected_version_range": "<= 6.7.1"
}

Maven / com.powsybl:powsybl-contingency-api

Package

Name
com.powsybl:powsybl-contingency-api
View open source insights on deps.dev
Purl
pkg:maven/com.powsybl/powsybl-contingency-api

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
6.3.0

Affected versions

5.*

5.0.0
5.1.0-RC1
5.1.0
5.1.1
5.2.0-alpha-1
5.2.0-RC1
5.2.0
5.2.1
5.3.0-alpha-1
5.3.0-alpha-2
5.3.0
5.3.1
5.3.2

6.*

6.0.0-RC1
6.0.0
6.0.1
6.0.2
6.0.3
6.1.0-alpha-1
6.1.0
6.1.1
6.1.2
6.2.0-RC1
6.2.0
6.2.1
6.2.2
6.2.3
6.2.4
6.3.0-alpha-1