CVE-2018-25049:
email-existence Inefficient Regular Expression Complexity vulnerability
7.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
12/27/2022
Updated
2/3/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
email-existence | npm | <= 0.1.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the regex-based email validation in index.js. The commit diff shows the regex /^\S+@\S+$/ was used without input length validation, making it vulnerable to REDOS via long emails. The patch adds a 300-character limit before regex validation, confirming the original function's regex was the attack vector. The exported email validation function is the primary entry point for this check, making it the clear vulnerable component.