CVE-2025-58050

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58050
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58050.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58050
Aliases
  • GHSA-c2gv-xgf5-5cc2
Downstream
Published
2025-08-27T18:47:35.041Z
Modified
2025-11-27T19:35:09.774037Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:L/SI:N/SA:L CVSS Calculator
Summary
PCRE2: heap-buffer-overflow read in match_ref due to missing boundary restoration in SCS
Details

The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (scs:...) (Scan SubString) verb when combined with (ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/ee626f5d79d5817bb21d6f048dc0da4c4e383443/cves/2025/58xxx/CVE-2025-58050.json",
    "cwe_ids": [
        "CWE-122",
        "CWE-125"
    ]
}
References

Affected packages

Git / github.com/pcre2project/pcre2

Affected ranges

Type
GIT
Repo
https://github.com/pcre2project/pcre2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed