Search for vulnerabilities
Vulnerability details: VCID-1yh1-jw3q-dfaq
Vulnerability ID VCID-1yh1-jw3q-dfaq
Aliases CVE-2022-23517
GHSA-5x79-w82f-gw8w
GMS-2022-8298
Summary Inefficient Regular Expression Complexity in rails-html-sanitizer ## Summary Certain configurations of rails-html-sanitizer `< 1.4.4` use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to rails-html-sanitizer `>= 1.4.4`.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23517.json
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2022-23517
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-5x79-w82f-gw8w
cvssv3.1 7.5 https://github.com/rails/rails-html-sanitizer
generic_textual HIGH https://github.com/rails/rails-html-sanitizer
cvssv3.1 7.5 https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
generic_textual HIGH https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
ssvc Track https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
cvssv3 7.5 https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
cvssv3.1 7.5 https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
cvssv3.1_qr HIGH https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
generic_textual HIGH https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
ssvc Track https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
cvssv3.1 7.5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml
generic_textual HIGH https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml
cvssv3.1 7.5 https://hackerone.com/reports/1684163
generic_textual HIGH https://hackerone.com/reports/1684163
ssvc Track https://hackerone.com/reports/1684163
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
ssvc Track https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-23517
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2022-23517
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23517.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rails/rails-html-sanitizer
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/ Found at https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/ Found at https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://hackerone.com/reports/1684163
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/ Found at https://hackerone.com/reports/1684163
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/ Found at https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-23517
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.31074
EPSS Score 0.00114
Published At Aug. 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:04:52.949417+00:00 Ruby Importer Import https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml 37.0.0