Description
API servers running express-zod-api
having:
- version of
express-zod-api
below10.0.0-beta1
, - and using the following (or similar) validation schema in its implementation:
z.string().email()
,
are vulnerable to a DoS attack due to:
- Inefficient Regular Expression Complexity in
zod
versions up to3.22.2
, - depending on
zod
.
Recommendation
Update the express-zod-api
package to the latest compatible version. Followings are version details:
- Affected version(s): < 10.0.0-beta1
- Patched version(s): 10.0.0-beta1
References
Related Issues
- Vite's `server.fs` settings were not applied to HTML files - CVE-2025-58752
- Trix editor subject to XSS vulnerabilities on copy & paste - CVE-2024-53847
- Knwl.js Regular Expression Denial of Service vulnerability - CVE-2020-26306
- VvvebJs Reflected Cross-Site Scripting (XSS) vulnerability - CVE-2024-29271
- Tags:
- npm
- express-zod-api
Anything's wrong? Let us know Last updated on October 04, 2023