Skip to content

Fix for GHSA-x5gf-qvw8-r2rm#6079

Open
dbankier wants to merge 1 commit intoUnitech:masterfrom
dbankier:master
Open

Fix for GHSA-x5gf-qvw8-r2rm#6079
dbankier wants to merge 1 commit intoUnitech:masterfrom
dbankier:master

Conversation

@dbankier
Copy link
Copy Markdown

I fixed the above GHSA issue by removing the regex usage and replacing it with a tokeniser.
I also added a number of automated test to so that you do not run into the issue you faced with the other previous attempts.
Input/output should now be matching the existing solution.

Q A
Bug fix? yes
New feature? no
BC breaks? no
Deprecations? no
Tests pass? yes
Fixed tickets #5971, #6620, #6075
License MIT
Doc PR https://github.com/pm2-hive/pm2-hive.github.io/pulls

fix(config): replace vulnerable args regex split with safe tokenizer
while preserving Unitech#6031-compatible parsing  behavior
@CLAassistant
Copy link
Copy Markdown

CLAassistant commented Feb 10, 2026

CLA assistant check
All committers have signed the CLA.

lab-kolerr pushed a commit to Kolerr-Lab/SENTINELI-COBOL-KNOWLEDGE-GRAPH that referenced this pull request Feb 27, 2026
Applied fix from PR #6079 which replaces regex-based parsing with tokenizer.

RESOLVED:
- pm2 Regular Expression Denial of Service (CVE-2025-5891)
- Severity: Low (CVSS 2.1/10)
- Source: github:dbankier/pm2#master (commit 3c58b3aa)
- Fix: Tokenizer-based parser replaces vulnerable regex

VERIFICATION:
- tokenizePm2ConfigArrayString() function present in code
- PR #6079: Unitech/pm2#6079
- Addresses issues from PR #5971

NOTE:
npm audit will continue showing this vulnerability because it checks
version numbers (6.0.14), not actual code. The fix IS applied in our
codebase. Will switch to official release when available.

FILES:
- package.json: Use github:dbankier/pm2#master
- package-lock.json: Lock to commit 3c58b3aa
- SECURITY_ADVISORY.md: Updated status to RESOLVED
lab-kolerr pushed a commit to Kolerr-Lab/SENTINELI-COBOL-KNOWLEDGE-GRAPH that referenced this pull request Feb 27, 2026
Applied fix from PR #6079 which replaces regex-based parsing with tokenizer.

RESOLVED:
- pm2 Regular Expression Denial of Service (CVE-2025-5891)
- Severity: Low (CVSS 2.1/10)
- Source: github:dbankier/pm2#master (commit 3c58b3aa)
- Fix: Tokenizer-based parser replaces vulnerable regex

VERIFICATION:
- tokenizePm2ConfigArrayString() function present in code
- PR #6079: Unitech/pm2#6079
- Addresses issues from PR #5971

NOTE:
npm audit will continue showing this vulnerability because it checks
version numbers (6.0.14), not actual code. The fix IS applied in our
codebase. Will switch to official release when available.

FILES:
- package.json: Use github:dbankier/pm2#master
- package-lock.json: Lock to commit 3c58b3aa
- SECURITY_ADVISORY.md: Updated status to RESOLVED
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants