cel-rust is a Common Expression Language interpreter written in Rust. Starting in version 0.10.0 and prior to version 0.11.4, parsing certain malformed CEL expressions can cause the parser to panic, terminating the process. When the crate is used to evaluate untrusted expressions (e.g., user-supplied input over an API), an attacker can send crafted input to trigger a denial of service (DoS). Version 0.11.4 fixes the issue.
References
Configurations
No configuration.
History
14 Oct 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cel-rust/cel-rust/security/advisories/GHSA-wxwx-9fh7-5mrw - |
10 Oct 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-10 23:15
Updated : 2025-10-14 19:36
NVD link : CVE-2025-62162
Mitre link : CVE-2025-62162
CVE.ORG link : CVE-2025-62162
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation