CVE-2022-31129

7.5 HIGH
Published: July 06, 2022 Modified: November 03, 2025

Description

moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3
Source: security-advisories@github.com
Patch Third Party Advisory
https://github.com/moment/moment/pull/6015#issuecomment-1152961973
Source: security-advisories@github.com
Exploit Issue Tracking Patch Third Party Advisory
https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g
Source: security-advisories@github.com
Issue Tracking Third Party Advisory
https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/
Source: security-advisories@github.com
Exploit Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html
Source: security-advisories@github.com
Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20221014-0003/
Source: security-advisories@github.com
Third Party Advisory
https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://github.com/moment/moment/pull/6015#issuecomment-1152961973
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking Patch Third Party Advisory
https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20221014-0003/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20241108-0002/
Source: af854a3a-2127-422b-91ae-364da2661108

21 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
4.2%
88th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian fedoraproject momentjs