6.5 CVE-2025-1194

Patch Exploit
 

A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the GPT-NeoX-Japanese model. The vulnerability occurs in the SubWordJapaneseTokenizer class, where regular expressions process specially crafted inputs. The issue stems from a regex exhibiting exponential complexity under certain conditions, leading to excessive backtracking. This can result in high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.48.1 (latest).
https://nvd.nist.gov/vuln/detail/CVE-2025-1194

Categories

CWE-1333 : Inefficient Regular Expression Complexity
Some regular expression engines have a feature called "backtracking". If the token cannot match, the engine "backtracks" to a position that may result in a different token that can match.

References

134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit

security@huntr.dev Patch Exploit


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:* < 4.50.0


REMEDIATION


Patch

Url
https://github.com/huggingface/transformers/commit/92c5ca9dd70de3ade2af2eb835...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2
https://huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
492 Regular Expression Exponential Blowup