CVE-2025-4690
📋 TL;DR
This CVE describes a Regular Expression Denial of Service (ReDoS) vulnerability in AngularJS's linky filter. Attackers can craft malicious input that causes super-linear runtime processing, potentially crashing or severely degrading application performance. All AngularJS versions are affected, and since AngularJS is End-of-Life, no official patches will be released.
💻 Affected Systems
- AngularJS
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Application becomes completely unresponsive, leading to service disruption and potential data loss if the system crashes.
Likely Case
Significant performance degradation causing slow response times and poor user experience.
If Mitigated
Minimal impact with proper input validation and rate limiting in place.
🎯 Exploit Status
Proof of concept available in provided references. Exploitation requires sending crafted input to applications using the vulnerable linky filter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://docs.angularjs.org/misc/version-support-status
Restart Required: No
Instructions:
No official patch available due to AngularJS EOL status. Consider migration to Angular (v2+) or implementing workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation to reject or sanitize inputs that could trigger the vulnerable regex pattern.
Replace linky Filter
allReplace the vulnerable linky filter with a custom implementation using a safer regex pattern or different URL detection method.
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to block malicious patterns
- Apply rate limiting to prevent repeated exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check if application uses AngularJS and specifically the linky filter from ngSanitize module.
Check Version:
Check AngularJS version in application dependencies or package.json
Verify Fix Applied:
Test with known malicious patterns from references to ensure application doesn't experience performance degradation.
📡 Detection & Monitoring
Log Indicators:
- Unusually long processing times for URL parsing
- Application crashes or restarts after receiving specific inputs
Network Indicators:
- Large or complex text inputs being sent to endpoints using linky filter
SIEM Query:
Search for application logs showing high CPU usage or timeout errors correlated with specific user inputs