strapi-provider-mailersend is vulnerable to Inefficient Regular Expression Complexity
30
Low Risk
Affected versions of this package are vulnerable to a polynomial regular expression denial of service (ReDoS) vulnerability in the email parsing regex /^(.*?)(?:s*<([^>]+)>)?$/. This regex, designed to extract email addresses from strings, uses non-greedy quantifiers and optional groups that can cause inefficient backtracking when processing certain inputs. An attacker can exploit this by crafting a long input string without the email part, such as a sequence of repeated characters, which triggers polynomial-time backtracking in the regex engine, leading to high CPU consumption and potential denial of service.
You are affected if you are using a version that falls within the vulnerable range.
strapi-provider-mailersend is vulnerable to Inefficient Regular Expression Complexity in versions 1.0.0 - 1.0.0.
Upgrade the strapi-provider-mailersend library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant