{
  "threat_severity" : "Moderate",
  "public_date" : "2025-03-03T00:00:00Z",
  "bugzilla" : {
    "description" : "CGI: ReDoS in CGI::Util#escapeElement",
    "id" : "2349696",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2349696"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-1333",
  "details" : [ "In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.", "A flaw was found in Ruby's CGI gem. The CGI::Util#escapeElement method is vulnerable to Regular expression Denial of Service (ReDoS), allowing a specially crafted input to cause a high CPU consumption." ],
  "statement" : "This issue will cause an excessive resource consumption, potentially resulting in a degraded application performance. However, an attacker does have the ability to completely deny service to legitimate users. As such, Red hat has rated the CVSS Availability as LOW instead of HIGH.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-04-23T00:00:00Z",
    "advisory" : "RHSA-2025:4063",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "ruby:3.1-8100020250407112943.489197e6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-06T00:00:00Z",
    "advisory" : "RHSA-2025:4487",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "ruby-0:3.0.7-165.el9_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-06T00:00:00Z",
    "advisory" : "RHSA-2025:4488",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "ruby:3.1-9050020250404144903.9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "ruby:2.5/ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "ruby:3.3/ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Will not fix",
    "package_name" : "ruby:3.3/ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-27220\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-27220\nhttps://www.ruby-lang.org/en/news/2025/02/26/security-advisories/" ],
  "name" : "CVE-2025-27220",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}