Intel

AIKIDO-2025-10660

strapi-provider-mailersend is vulnerable to Inefficient Regular Expression Complexity

Inefficient Regular Expression Complexity Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

30

Low Risk

This Affects:

JSstrapi-provider-mailersend
1.0.0 - 1.0.0
Fixed in 1.0.1

TL;DR

Affected versions of this package are vulnerable to a polynomial regular expression denial of service (ReDoS) vulnerability in the email parsing regex /^(.*?)(?:s*<([^>]+)>)?$/. This regex, designed to extract email addresses from strings, uses non-greedy quantifiers and optional groups that can cause inefficient backtracking when processing certain inputs. An attacker can exploit this by crafting a long input string without the email part, such as a sequence of repeated characters, which triggers polynomial-time backtracking in the regex engine, leading to high CPU consumption and potential denial of service.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

strapi-provider-mailersend is vulnerable to Inefficient Regular Expression Complexity in versions 1.0.0 - 1.0.0.

How to fix this

Upgrade the strapi-provider-mailersend library to the patch version.