A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's `token2json()` method. This...
Full analysis pending. Showing NVD description excerpt.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| transformers | pip | <= 4.51.3 | 4.52.1 |
| transformers | pip | — | No patch |
Severity & Risk
Recommended Action
Patch available
Update transformers to version 4.52.1
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Technical Details
NVD Description
A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically within the DonutProcessor class's `token2json()` method. This vulnerability affects versions 4.50.3 and earlier, and is fixed in version 4.52.1. The issue arises from the regex pattern `<s_(.*?)>` which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to service disruption, resource exhaustion, and potential API service vulnerabilities, impacting document processing tasks using the Donut model.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L References
- github.com/advisories/GHSA-37mw-44qp-f5jm
- github.com/huggingface/transformers/commit/ebbe9b12dd75b69f92100d684c47f923ee262a93
- github.com/huggingface/transformers/pull/37788
- huntr.com/bounties/25282953-5827-4384-bb6f-5790d275721b
- nvd.nist.gov/vuln/detail/CVE-2025-3933
- github.com/huggingface/transformers/commit/ebbe9b12dd75b69f92100d684c47f923ee262a93 Patch
- huntr.com/bounties/25282953-5827-4384-bb6f-5790d275721b Exploit 3rd Party