Current behavior 💣
CVE-2022-25858 | Unknown
terser is vulnerable to regular expression denial of service. The
vulnerability exists in index.js and evaluate.js because regular
expressions used are not properly handled which allows an attacker
to send crafted requests which causes an application crash
path of the issue:
file9579178566_1660814181915_html/WebUI_18_08_2022.2/node_modules/terser
Expected behavior ☀️
The latest version(5.14.2) of "terser" should be used.
Reproduction Example 👾
- Install the library in any sample project.
- Scan the sample project binaries with "Veracode" or any other security tool.
Environment 🖥
This is a security issue and can be reproduced in any environment by scanning the library with any security tool.

Current behavior 💣
CVE-2022-25858 | Unknown
terser is vulnerable to regular expression denial of service. The
vulnerability exists in index.js and evaluate.js because regular
expressions used are not properly handled which allows an attacker
to send crafted requests which causes an application crash
path of the issue:
file9579178566_1660814181915_html/WebUI_18_08_2022.2/node_modules/terser
Expected behavior ☀️
The latest version(5.14.2) of "terser" should be used.
Reproduction Example 👾
Environment 🖥
This is a security issue and can be reproduced in any environment by scanning the library with any security tool.
