Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
References
Link | Resource |
---|---|
https://github.com/ansman/validate.js/issues/342 | Issue Tracking |
https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/ | Exploit Third Party Advisory |
Configurations
History
23 Sep 2025, 02:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:validatejs:validate.js:*:*:*:*:*:node.js:*:* | |
References | () https://github.com/ansman/validate.js/issues/342 - Issue Tracking | |
References | () https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/ - Exploit, Third Party Advisory | |
First Time |
Validatejs
Validatejs validate.js |
Information
Published : 2024-10-26 21:15
Updated : 2025-09-23 02:05
NVD link : CVE-2020-26308
Mitre link : CVE-2020-26308
CVE.ORG link : CVE-2020-26308
JSON object : View
Products Affected
validatejs
- validate.js
CWE
CWE-1333
Inefficient Regular Expression Complexity