is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00171}

epss

{'score': 0.00183}


Mon, 14 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-14T14:37:16.925Z

Reserved: 2020-10-01T00:00:00.000Z

Link: CVE-2020-26302

cve-icon Vulnrichment

Updated: 2024-08-04T15:56:04.334Z

cve-icon NVD

Status : Modified

Published: 2022-12-22T21:15:08.877

Modified: 2024-11-21T05:19:48.677

Link: CVE-2020-26302

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.