CVE-2020-26308

Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:validatejs:validate.js:*:*:*:*:*:node.js:*:*

History

23 Sep 2025, 02:05

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:validatejs:validate.js:*:*:*:*:*:node.js:*:*
References () https://github.com/ansman/validate.js/issues/342 - () https://github.com/ansman/validate.js/issues/342 - Issue Tracking
References () https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/ - () https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/ - Exploit, Third Party Advisory
First Time Validatejs
Validatejs validate.js

Information

Published : 2024-10-26 21:15

Updated : 2025-09-23 02:05


NVD link : CVE-2020-26308

Mitre link : CVE-2020-26308

CVE.ORG link : CVE-2020-26308


JSON object : View

Products Affected

validatejs

  • validate.js
CWE
CWE-1333

Inefficient Regular Expression Complexity