Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
References
Link | Resource |
---|---|
https://github.com/ansman/validate.js/issues/342 | Issue Tracking |
https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/ | Exploit Third Party Advisory |
Configurations
History
23 Sep 2025, 02:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Validatejs validate.js
Validatejs |
|
CPE | cpe:2.3:a:validatejs:validate.js:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/ansman/validate.js/issues/342 - Issue Tracking | |
References | () https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/ - Exploit, Third Party Advisory |
28 Oct 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Oct 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-26 21:15
Updated : 2025-09-23 02:05
NVD link : CVE-2020-26308
Mitre link : CVE-2020-26308
CVE.ORG link : CVE-2020-26308
JSON object : View
Products Affected
validatejs
- validate.js
CWE
CWE-1333
Inefficient Regular Expression Complexity