Fix regex — CVE-2022-24713 HIGH

Fix CVE-2022-24713 (HIGH) in regex for Rust. Paste your Cargo.toml into PackageFix and get a patched version — no CLI, no signup. Redos via crafted regex with large repetition counts.

⚠ Vulnerability

CVE-2022-24713 (HIGH) — ReDoS via crafted regex with large repetition counts in regex below 1.10.4.

Vulnerable — Cargo.toml

regex = "1.7.0"

Fixed — Cargo.toml

regex = "1.10.4"
✓ Fix

Update regex to 1.10.4 and run cargo update.

Paste your manifest — get back a fixed version with all CVEs patched in seconds.

Open PackageFix →

No signup · No CLI · No GitHub connection · Runs 100% in your browser

CVE Details

FieldValue
CVE IDCVE-2022-24713
SeverityHIGH
Packageregex (Rust)
Safe version1.10.4
CISA KEV
DescriptionRedos via crafted regex with large repetition counts

Frequently Asked Questions

What is CVE-2022-24713?
CVE-2022-24713 is a HIGH severity vulnerability in regex (Rust) that allows ReDoS via crafted regex with large repetition counts. Update to 1.10.4 or later.
How do I fix CVE-2022-24713 in regex?
Update regex to version 1.10.4 in your Cargo.toml and run cargo update.
Is CVE-2022-24713 being actively exploited?
Check packagefix.dev — the CISA KEV catalog updates daily.
How do I verify the fix for CVE-2022-24713?
After updating, paste your Cargo.toml into PackageFix again. If CVE-2022-24713 no longer appears in the CVE table, the fix is applied.

Related Guides