Wiz Agents & Workflows are here
Vulnerability DatabaseGHSA-xgh6-85xh-479p

GHSA-xgh6-85xh-479p
JavaScript vulnerability analysis and mitigation

Overview

A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in npm-user-validate package versions 1.0.0 and below, identified as GHSA-xgh6-85xh-479p. The vulnerability was discovered and published on October 16, 2020, affecting the email validation functionality of the package. The issue was found in the regex pattern used to validate user email addresses, which exhibited exponential processing time when handling long input strings beginning with @ characters (GitHub Advisory).

Technical details

The vulnerability specifically affects the email validation function in npm-user-validate. The core issue lies in the implementation of the regular expression pattern used for email validation, which demonstrates exponential time complexity when processing certain input patterns. The vulnerability has been assigned a CVSS 3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

When exploited, this vulnerability can lead to Denial of Service conditions in applications using the affected function to process arbitrary user input without character limits. The impact is primarily focused on service availability, with no direct effect on confidentiality or integrity (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 1.0.1 of npm-user-validate, which improved the regular expression pattern and implemented a 254-character limit. For users unable to update immediately, recommended workarounds include restricting character length before passing values to the email validation function and implementing more rigorous input sanitization and validation (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34156CRITICAL9.9
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-javascript
NoYesMar 30, 2026
CVE-2026-34363HIGH8.2
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026
CVE-2026-33949HIGH8.1
  • JavaScriptJavaScript
  • @tinacms/graphql
NoYesMar 30, 2026
CVE-2026-34043MEDIUM5.9
  • JavaScriptJavaScript
  • serialize-javascript
NoYesMar 31, 2026
CVE-2026-34373MEDIUM5.3
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management