CVE-2025-58050

Source
https://cve.org/CVERecord?id=CVE-2025-58050
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58050.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58050
Aliases
  • GHSA-c2gv-xgf5-5cc2
Downstream
Related
Published
2025-08-27T18:47:35.041Z
Modified
2026-03-20T12:45:23.072434Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:L/SI:N/SA:L CVSS Calculator
Summary
PCRE2: heap-buffer-overflow read in match_ref due to missing boundary restoration in SCS
Details

The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.

Database specific
{
    "cwe_ids": [
        "CWE-122",
        "CWE-125"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58050.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/pcre2project/pcre2

Affected ranges

Type
GIT
Repo
https://github.com/pcre2project/pcre2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

pcre2-10.*
pcre2-10.38
pcre2-10.38-RC1
pcre2-10.39
pcre2-10.40
pcre2-10.41
pcre2-10.42
pcre2-10.43
pcre2-10.43-RC1
pcre2-10.44
pcre2-10.45

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58050.json"
vanir_signatures
[
    {
        "digest": {
            "line_hashes": [
                "97874913069314297822922026659519884128",
                "125344604230288086545355898967879485183",
                "295312349831834939820016000040301121058",
                "152484683899926719584038087808047164426"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "src/pcre2_match.c"
        },
        "id": "CVE-2025-58050-01faf4fa",
        "deprecated": false,
        "source": "https://github.com/pcre2project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254",
        "signature_version": "v1",
        "signature_type": "Line"
    },
    {
        "digest": {
            "function_hash": "76962601304507413989015398055719776209",
            "length": 103016.0
        },
        "target": {
            "file": "src/pcre2_match.c",
            "function": "match"
        },
        "id": "CVE-2025-58050-334a70e8",
        "deprecated": false,
        "source": "https://github.com/pcre2project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254",
        "signature_version": "v1",
        "signature_type": "Function"
    }
]