CVE Vulnerabilities

CVE-2025-6069

Inefficient Regular Expression Complexity

Published: Jun 17, 2025 | Modified: Jul 07, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 8RedHatpython39:3.9-8100020251126112422.d47b87a4*
Red Hat Enterprise Linux 8RedHatpython39-devel:3.9-8100020251126112422.d47b87a4*
Red Hat Enterprise Linux 9RedHatpython3.9-0:3.9.25-2.el9_7*
Red Hat Enterprise Linux 9RedHatpython3.9-0:3.9.25-2.el9_7*
Red Hat Ceph Storage 7RedHatrhceph/rhceph-7-rhel9:sha256:7593f0bc7a6b312b5b686f0077443f11e9952128801809828e8bd3a73314c116*
Red Hat Ceph Storage 8RedHatrhceph/rhceph-8-rhel9:sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6*
Red Hat Discovery 2RedHatdiscovery/discovery-server-rhel9:sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543*
Red Hat Discovery 2RedHatdiscovery/discovery-ui-rhel9:sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee*
Red Hat Update Infrastructure 5RedHatrhui5/cds-rhel9:sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be*
Red Hat Update Infrastructure 5RedHatrhui5/haproxy-rhel9:sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16*
Red Hat Update Infrastructure 5RedHatrhui5/installer-rhel9:sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9*
Red Hat Update Infrastructure 5RedHatrhui5/rhua-rhel9:sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2*
JythonUbuntuoracular*
JythonUbuntuplucky*
Python2.7Ubuntubionic*
Python2.7Ubuntuesm-apps/focal*
Python2.7Ubuntuesm-apps/jammy*
Python2.7Ubuntuesm-infra-legacy/trusty*
Python2.7Ubuntuesm-infra/bionic*
Python2.7Ubuntuesm-infra/xenial*
Python2.7Ubuntufocal*
Python2.7Ubuntujammy*
Python2.7Ubuntutrusty*
Python2.7Ubuntutrusty/esm*
Python2.7Ubuntuxenial*
Python3.10Ubuntujammy*
Python3.11Ubuntuesm-apps/jammy*
Python3.11Ubuntujammy*
Python3.12Ubuntunoble*
Python3.12Ubuntuoracular*
Python3.13Ubuntudevel*
Python3.13Ubuntuoracular*
Python3.13Ubuntuplucky*
Python3.13Ubuntuquesting*
Python3.13Ubuntuupstream*
Python3.14Ubuntuupstream*
Python3.4Ubuntuesm-infra-legacy/trusty*
Python3.4Ubuntutrusty*
Python3.4Ubuntutrusty/esm*
Python3.5Ubuntuesm-infra-legacy/trusty*
Python3.5Ubuntuesm-infra/xenial*
Python3.5Ubuntutrusty*
Python3.5Ubuntutrusty/esm*
Python3.5Ubuntuxenial*
Python3.6Ubuntubionic*
Python3.6Ubuntuesm-infra/bionic*
Python3.7Ubuntubionic*
Python3.7Ubuntuesm-apps/bionic*
Python3.8Ubuntubionic*
Python3.8Ubuntuesm-apps/bionic*
Python3.8Ubuntuesm-infra/focal*
Python3.8Ubuntufocal*
Python3.9Ubuntuesm-apps/focal*
Python3.9Ubuntufocal*

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References