The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.
{
"cwe_ids": [
"CWE-122",
"CWE-125"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58050.json",
"cna_assigner": "GitHub_M"
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58050.json"
[
{
"digest": {
"line_hashes": [
"97874913069314297822922026659519884128",
"125344604230288086545355898967879485183",
"295312349831834939820016000040301121058",
"152484683899926719584038087808047164426"
],
"threshold": 0.9
},
"target": {
"file": "src/pcre2_match.c"
},
"id": "CVE-2025-58050-01faf4fa",
"deprecated": false,
"source": "https://github.com/pcre2project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254",
"signature_version": "v1",
"signature_type": "Line"
},
{
"digest": {
"function_hash": "76962601304507413989015398055719776209",
"length": 103016.0
},
"target": {
"file": "src/pcre2_match.c",
"function": "match"
},
"id": "CVE-2025-58050-334a70e8",
"deprecated": false,
"source": "https://github.com/pcre2project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254",
"signature_version": "v1",
"signature_type": "Function"
}
]