Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.powsybl/powsybl-commons
  4. ›
  5. CVE-2025-48058

CVE-2025-48058: PowSyBl Core contains Polynomial REDoS’es

June 19, 2025 (updated June 20, 2025)

What kind of vulnerability is it? Who is impacted?

This is an advisory for a potential polynomial Regular Expression Denial of Service (ReDoS) vulnerability in the PowSyBl’s DataSource mechanism. When the listNames(String regex) method is called on a DataSource, the user-supplied regular expression (which may be unvalidated) is compiled and evaluated against a collection of file-like resource names.

To trigger a polynomial ReDoS via this mechanism, two attacker-controlled conditions must be met:

  • Control over the regex input passed into listNames(String regex).
  • Example: An attacker supplies a malicious pattern like (.*a){10000}.
  • Control or influence over the file/resource names being matched.
  • Example: Filenames such as "aaaa...!" that induce regex engine backtracking.

If both conditions are satisfied, a malicious actor can cause significant CPU consumption due to regex backtracking — even with polynomial patterns. Since both inputs can be controlled via a publicly accessible method or external filesystem handling, the listNames(String regex) method is considered vulnerable to polynomial REDoS.

Unlike classic catastrophic exponential ReDoS, this subtle attack exploits a greedy .* prefix followed by a fixed suffix, repeated multiple times. When applied to long filenames that almost match the pattern, the regex engine performs extensive backtracking, degrading performance predictably with input size. In a multi-tenant environment, an attacker can degrade the performance - and thereby the availability - of the server to an extent that it affects other users of the application. This can for example be useful if an attacker wants to delay other users in a scenario where a time advantage can be a competitive advantage. A tricky part in this is that the attacker needs to control both the pattern and the input which may not always be the case.

References

  • github.com/advisories/GHSA-rqpx-f6rc-7hm5
  • github.com/powsybl/powsybl-core
  • github.com/powsybl/powsybl-core/commit/72f79dec6d4292f892fbddd68a19c67935c7d81f
  • github.com/powsybl/powsybl-core/releases/tag/v6.7.2
  • github.com/powsybl/powsybl-core/security/advisories/GHSA-rqpx-f6rc-7hm5
  • nvd.nist.gov/vuln/detail/CVE-2025-48058

Code Behaviors & Features

Detect and mitigate CVE-2025-48058 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.7.2

Fixed versions

  • 6.7.2

Solution

Upgrade to version 6.7.2 or above.

Weakness

  • CWE-1333: Inefficient Regular Expression Complexity

Source file

maven/com.powsybl/powsybl-commons/CVE-2025-48058.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:54 +0000.