CVE-2024-52798 – Regular Expression Denial of Service (ReDoS)
Severity: None2025-12-19
Abstract
path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of path-to-regexp. Upgrade to 0.1.12. This vulnerability exists because of an incomplete fix for CVE-2024-45296.
The Oxygen products incorporate path-to-regexp (transitively via Express) as a third-party library. This advisory was opened to address the potential impact of this third-party library’s vulnerability.
Affected Products/Versions
| Product | Severity | Fixed Release Availability |
| Oxygen Content Fusion v7.1 and older | None | Oxygen Content Fusion 8.0 build 2025031016 |
Detail
CVE-2024-52798
Severity: High
CVSS Score: 7.7
CVE-2024-52798 is a Regular Expression Denial of Service (ReDoS) issue in the 0.1.x releases of the path-to-regexp library. In certain cases, the library can generate a regular expression that is susceptible to excessive backtracking, potentially causing performance degradation under malicious input. The issue stems from an incomplete fix for CVE-2024-45296 and is addressed by upgrading to path-to-regexp 0.1.12.
We reviewed our usage of Express (which includes path-to-regexp) in Oxygen Content Fusion. We do not process user-controlled input with custom regular expressions. Given this usage, we assess the vulnerability as not exploitable in our products.
Starting with Oxygen Content Fusion version 8.0 build 2025031016 path-to-regexp was updated to a non-vulnerable version.
