CVE-2020-26256: Denial of service in fast-csv
5.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.76784%
CWE
Published
12/8/2020
Updated
2/1/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
fast-csv | npm | < 4.3.6 | 4.3.6 |
@fast-csv/parse | npm | < 4.3.6 | 4.3.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The key vulnerability was identified in the regular expression EMPTY_ROW_REGEXP used for empty row detection. The commit diff shows this regex was removed and replaced with a simpler string manipulation check in RowParser.isEmptyRow. The vulnerable code path was triggered when using the ignoreEmpty parsing option, as confirmed by advisory details and the test case added in the patch. The regex's structure (with nested optional groups and repetitions) makes it susceptible to ReDoS attacks, which aligns with the CWE-400 classification for uncontrolled resource consumption.