ReDoS Vulnerability in ua-parser-js version
High severity
GitHub Reviewed
Published
Jan 23, 2023
in
faisalman/ua-parser-js
•
Updated Oct 17, 2025
Package
Affected versions
>= 0.8.0, < 1.0.33
>= 0.7.30, < 0.7.33
Patched versions
1.0.33
0.7.33
Description
Published to the GitHub Advisory Database
Jan 24, 2023
Reviewed
Jan 24, 2023
Published by the National Vulnerability Database
Jan 26, 2023
Last updated
Oct 17, 2025
Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in
ua-parser-js
.Impact:
This vulnerability bypass the library's
MAX_LENGTH
input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.Affected Versions:
From version
0.7.30
to before versions0.7.33
/1.0.33
.Patches:
A patch has been released to remove the vulnerable regular expression, update to version
0.7.33
/1.0.33
or later.References:
Regular expression Denial of Service - ReDoS
Credits:
Thanks to @snyk who first reported the issue.
References