{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T09:47:50.282","vulnerabilities":[{"cve":{"id":"CVE-2025-3264","sourceIdentifier":"security@huntr.dev","published":"2025-07-07T10:15:27.500","lastModified":"2025-08-07T01:02:30.700","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_imports()` function within `dynamic_module_utils.py`. This vulnerability affects versions 4.49.0 and is fixed in version 4.51.0. The issue arises from a regular expression pattern `\\s*try\\s*:.*?except.*?:` used to filter out try/except blocks from Python code, which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to remote code loading disruption, resource exhaustion in model serving, supply chain attack vectors, and development pipeline disruption."},{"lang":"es","value":"Se descubrió una vulnerabilidad de denegación de servicio por expresión regular (ReDoS) en la librería Hugging Face Transformers, específicamente en la función `get_imports()` de `dynamic_module_utils.py`. Esta vulnerabilidad afecta a la versión 4.49.0 y se corrigió en la versión 4.51.0. El problema surge de un patrón de expresión regular `\\s*try\\s*:.*?except.*?:` utilizado para filtrar bloques try/except del código Python, que puede explotarse para causar un consumo excesivo de CPU mediante cadenas de entrada manipuladas debido a un retroceso catastrófico. Esta vulnerabilidad puede provocar interrupciones en la carga remota de código, agotamiento de recursos en la entrega de modelos, vectores de ataque a la cadena de suministro e interrupciones en el flujo de trabajo de desarrollo."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-1333"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:*","versionStartIncluding":"4.49.0","versionEndExcluding":"4.51.0","matchCriteriaId":"C286893D-37B2-495A-A91F-F7CB2CFE872C"}]}]}],"references":[{"url":"https://github.com/huggingface/transformers/commit/0720e206c6ba28887e4d60ef60a6a089f6c1cc76","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/3c6f7822-9992-476d-8cf0-b0b1623427df","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}