
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-26309 affects nope-validator versions 0.11.3 and prior, containing one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability was discovered in the email validation functionality of the library (GitHub Advisory).
The vulnerability exists in the email validation regex used by nope-validator. When processing certain maliciously crafted input strings, the regular expression can exhibit exponential backtracking behavior, leading to a denial of service condition. The issue was identified through CodeQL analysis and has a CVSS v4.0 base score of 8.7 HIGH (NVD).
This vulnerability may lead to denial of service attacks when processing maliciously crafted email addresses. An attacker can construct input that causes the email validation function to consume excessive CPU resources, potentially making the application unresponsive (GitHub Advisory).
At the time of publication, no patches were available for this vulnerability. Users should consider implementing input validation before passing data to the email validation function or using alternative email validation libraries (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."