User controlled `request.getHeader("Referer")`, `request.getRequestURL()` and `request.getQueryString()` are used to build and run a regex expression. The attacker doesn't have to use a browser and may send a specially crafted Referer header programmatically. Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side. This problem has been fixed in Roller 6.0.2.
Use CWE-400, Apache vendor hub and Roller product page to widen CVE-2021-33580 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2018-17198, CVE-2014-0030 and CVE-2015-0249 for nearby disclosures in the same product family.