{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T12:02:14.472","vulnerabilities":[{"cve":{"id":"CVE-2024-10955","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:22.350","lastModified":"2025-10-15T13:15:38.243","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Regular Expression Denial of Service (ReDoS) vulnerability exists in gaizhenbiao/chuanhuchatgpt, as of commit 20b2e02. The server uses the regex pattern `r'<[^>]+>'` to parse user input. In Python's default regex engine, this pattern can take polynomial time to match certain crafted inputs. An attacker can exploit this by uploading a malicious JSON payload, causing the server to consume 100% CPU for an extended period. This can lead to a Denial of Service (DoS) condition, potentially affecting the entire server."},{"lang":"es","value":"Existe una vulnerabilidad de denegación de servicio de expresiones regulares (ReDoS) en gaizhenbiao/chuanhuchatgpt, a partir del commit 20b2e02. El servidor utiliza el patrón de expresiones regulares `r'&lt;[^&gt;]+&gt;''` para analizar la entrada del usuario. En el motor de expresiones regulares predeterminado de Python, este patrón puede tardar un tiempo polinomial en coincidir con ciertas entradas manipuladas. Un atacante puede explotar esto cargando un payload JSON maliciosa, lo que provoca que el servidor consuma el 100 % de la CPU durante un período prolongado. Esto puede provocar una denegación de servicio (DoS), que podría afectar a todo el servidor."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-1333"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:2024-09-19:*:*:*:*:*:*:*","matchCriteriaId":"143A0F2A-07CF-404A-9F88-1B535CAD9DDC"}]}]}],"references":[{"url":"https://huntr.com/bounties/8291f8d0-5060-47e7-9986-1f411310fb7b","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}