-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The core vulnerability stems from the Token name field in page_pref_tokens.py where the commit added a Length validator (max=256). The pre-patch code only had DataRequired(), leaving it vulnerable to resource exhaustion via long inputs. The Fullname field fixes are related but less critical, as the CVE specifically emphasizes the Token name parameter. The test cases (test_add_access_token_with_name_too_long) confirm the token name validation was the primary attack vector.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rdiffweb | pip | < 2.5.0a3 | 2.5.0a3 |
Ongoing coverage of React2Shell