Lookup for vulnerable packages by Package URL.
| Purl | pkg:npm/ua-parser-js@0.8.1 |
| Type | npm |
| Namespace | |
| Name | ua-parser-js |
| Version | 0.8.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 1.0.33 |
| Latest_non_vulnerable_version | 1.0.33 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-jzj3-ddrr-u7hd |
| vulnerability_id |
VCID-jzj3-ddrr-u7hd |
| summary |
ReDoS Vulnerability in ua-parser-js version
### Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in `ua-parser-js`.
### Impact:
This vulnerability bypass the library's `MAX_LENGTH` input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.
### Affected Versions:
From version `0.7.30` to before versions `0.7.33` / `1.0.33`.
### Patches:
A patch has been released to remove the vulnerable regular expression, update to version `0.7.33` / `1.0.33` or later.
### References:
[Regular expression Denial of Service - ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)
### Credits:
Thanks to @Snyk who first reported the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25927 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.8083 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80793 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80801 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.80816 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01453 |
| scoring_system |
epss |
| scoring_elements |
0.808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81034 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81126 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81102 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82772 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82758 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25927 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-25927, GHSA-fhg7-m89q-25r3, GMS-2023-120
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jzj3-ddrr-u7hd |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-dmh1-fut8-2ygz |
| vulnerability_id |
VCID-dmh1-fut8-2ygz |
| summary |
Embedded malware in ua-parser-js
The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75039 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75149 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.7511 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.7512 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75113 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75085 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75073 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75063 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75075 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75086 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75031 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00863 |
| scoring_system |
epss |
| scoring_elements |
0.75034 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4229 |
|
| 1 |
|
| 2 |
| reference_url |
https://github.com/faisalman/ua-parser-js/issues/536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:14:48Z/ |
|
|
| url |
https://github.com/faisalman/ua-parser-js/issues/536 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4229, GHSA-pjwm-rvh2-c87w, GMS-2021-1
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dmh1-fut8-2ygz |
|
| 1 |
| url |
VCID-sy9w-7ehk-m3he |
| vulnerability_id |
VCID-sy9w-7ehk-m3he |
| summary |
Duplicate Advisory: Embedded malware in ua-parser-js
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-pjwm-rvh2-c87w. This link is maintained to preserve external references.
### Original Description
A vulnerability was found in ua-parser-js 0.7.29/0.8.0/1.0.0. It has been rated as critical. This issue affects the crypto mining component which introduces a backdoor. Upgrading to version 0.7.30, 0.8.1 and 1.0.1 is able to address this issue. It is recommended to upgrade the affected component. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-236c-vhj4-gfxg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sy9w-7ehk-m3he |
|
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:npm/ua-parser-js@0.8.1 |