seroval affected by Denial of Service via RegExp serialization
Description
Published to the GitHub Advisory Database
Jan 21, 2026
Reviewed
Jan 21, 2026
Published by the National Vulnerability Database
Jan 22, 2026
Last updated
Jan 22, 2026
Overriding RegExp serialization with extremely large patterns can exhaust JavaScript runtime memory during deserialization. Additionally, overriding RegExp serialization with patterns that trigger catastrophic backtracking can lead to ReDoS (Regular Expression Denial of Service).
Mitigation:
SerovalintroducesdisabledFeatures(a bitmask) in serialization/deserialization methods, withFeature.RegExpas a dedicated flag. Users are recommended to configuredisabledFeaturesto disable RegExp serialization entirely.References