### [CVE-2023-26115](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26115) ![](https://img.shields.io/static/v1?label=Product&message=org.webjars.npm%3Aword-wrap&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=word-wrap&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen) ### Description All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable. ### POC #### Reference - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657 - https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973 #### Github - https://github.com/git-kick/ioBroker.e3dc-rscp - https://github.com/martinjackson/simple-widgets - https://github.com/seal-community/patches - https://github.com/sebhildebrandt/word-wrap-next