Koa is expressive middleware for Node.js using ES2017 async functions. Prior to versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3, Koa uses an evil regex to parse the `X-Forwarded-Proto` and `X-Forwarded-Host` HTTP headers. This can be exploited to carry out a Denial-of-Service attack. Versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3 fix the issue.
References
Configurations
Configuration 1 (hide)
|
History
20 Jan 2026, 14:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:koajs:koa:3.0.0:alpha0:*:*:*:node.js:*:* cpe:2.3:a:koajs:koa:*:*:*:*:*:node.js:*:* cpe:2.3:a:koajs:koa:3.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:koajs:koa:3.0.0:alpha2:*:*:*:node.js:*:* |
|
| References | () https://github.com/koajs/koa/blob/master/lib/request.js#L259 - Product | |
| References | () https://github.com/koajs/koa/blob/master/lib/request.js#L404 - Product | |
| References | () https://github.com/koajs/koa/commit/5054af6e31ffd451a4151a1fe144cef6e5d0d83c - Patch | |
| References | () https://github.com/koajs/koa/commit/5f294bb1c7c8d9c61904378d250439a321bffd32 - Patch | |
| References | () https://github.com/koajs/koa/commit/93fe903fc966635a991bcf890cfc3427d33a1a08 - Patch | |
| References | () https://github.com/koajs/koa/releases/tag/2.15.4 - Release Notes | |
| References | () https://github.com/koajs/koa/security/advisories/GHSA-593f-38f6-jp5m - Vendor Advisory | |
| First Time |
Koajs koa
Koajs |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| Summary |
|
12 Feb 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-12 18:15
Updated : 2026-01-20 14:42
NVD link : CVE-2025-25200
Mitre link : CVE-2025-25200
CVE.ORG link : CVE-2025-25200
JSON object : View
Products Affected
koajs
- koa
CWE
CWE-1333
Inefficient Regular Expression Complexity
