### [CVE-2022-21222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21222) ![](https://img.shields.io/static/v1?label=Product&message=css-what&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%202.1.3%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen) ### Description The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function. ### POC #### Reference - https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488 - https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488 #### Github - https://github.com/karimhabush/cyberowl