CVE-2020-26308

Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:validatejs:validate.js:*:*:*:*:*:node.js:*:*

History

23 Sep 2025, 02:05

Type Values Removed Values Added
First Time Validatejs validate.js
Validatejs
CPE cpe:2.3:a:validatejs:validate.js:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/ansman/validate.js/issues/342 - () https://github.com/ansman/validate.js/issues/342 - Issue Tracking
References () https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/ - () https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/ - Exploit, Third Party Advisory

28 Oct 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Validate.js proporciona una forma declarativa de validar objetos de JavaScript. Las versiones 0.13.1 y anteriores contienen una o más expresiones regulares que son vulnerables a la denegación de servicio por expresión regular (ReDoS). Al momento de la publicación, no se conocían parches disponibles.

26 Oct 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-26 21:15

Updated : 2025-09-23 02:05


NVD link : CVE-2020-26308

Mitre link : CVE-2020-26308

CVE.ORG link : CVE-2020-26308


JSON object : View

Products Affected

validatejs

  • validate.js
CWE
CWE-1333

Inefficient Regular Expression Complexity