Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.powsybl/powsybl-contingency-api
  4. ›
  5. CVE-2025-48059

CVE-2025-48059: PowSyBl Core Contains a Polynomial ReDoS in RegexCriterion

June 19, 2025 (updated June 20, 2025)

What kind of vulnerability is it? Who is impacted?

This is an advisory for a potential polynomial Regular Expression Denial of Service (ReDoS) vulnerability in the RegexCriterion class. This class compiles and evaluates an unvalidated, user-supplied regular expression against the identifier of an Identifiable object via Pattern.compile(regex).matcher(id).find().

To trigger polynomial ReDoS in RegexCriterion, two attacker-controlled conditions must be met:

  • Control over the regex input passed into the constructor:
  • Example: An attacker supplies a malicious pattern such as (.*a){10000}.
  • Control or influence over the output of Identifiable.getId():
  • Example: A long string like "aaaa...!" that forces excessive backtracking.

If both conditions are satisfied, a malicious actor can cause significant CPU exhaustion through repeated or recursive filter(...) calls — especially if performed over large network models or filtering operations. While this class does not handle file or memory data directly, its reliance on untrusted regular expressions and potentially attacker-controlled identifiers makes it vulnerable to polynomial ReDoS under the right conditions. This risk is amplified when the library is used in dynamic or scriptable environments where external users control either criterion construction or network object identifiers. Although not as dangerous as catastrophic exponential ReDoS, the polynomial pattern still induces significant performance degradation as input size increases.

References

  • github.com/advisories/GHSA-8qjw-9xgm-c9ff
  • github.com/powsybl/powsybl-core
  • github.com/powsybl/powsybl-core/commit/d8398f689a5ccd505bd62eee2bd6670a29133110
  • github.com/powsybl/powsybl-core/releases/tag/v6.7.2
  • github.com/powsybl/powsybl-core/security/advisories/GHSA-8qjw-9xgm-c9ff
  • nvd.nist.gov/vuln/detail/CVE-2025-48059

Code Behaviors & Features

Detect and mitigate CVE-2025-48059 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.0 before 6.3.0

Fixed versions

  • 6.3.0

Solution

Upgrade to version 6.3.0 or above.

Weakness

  • CWE-1333: Inefficient Regular Expression Complexity

Source file

maven/com.powsybl/powsybl-contingency-api/CVE-2025-48059.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:38 +0000.