WhisperX tag archive

#path-to-regexp

This page collects WhisperX intelligence signals tagged #path-to-regexp. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-04-30 01:54:10 · GitHub Issues

1. CVE-2024-45296: High-Severity Regex Denial-of-Service Flaw Found in path-to-regexp Library Used by Express.js

A high-severity vulnerability, tracked as CVE-2024-45296, has been identified in path-to-regexp version 0.1.7, a widely deployed npm library that converts Express-style path strings into regular expressions. The flaw enables attackers to trigger specially crafted path patterns that produce inefficient regex output, lea...

The Lab · 2026-04-30 01:54:11 · GitHub Issues

2. CVE-2024-52798: High-Severity ReDoS Flaw Discovered in path-to-regexp Dependency Used by Express.js

A high-severity vulnerability has been identified in path-to-regexp version 0.1.7, a widely-used Node.js library that converts Express-style path strings into regular expressions. The flaw, tracked as CVE-2024-52798, stems from a regular expression output that becomes vulnerable to catastrophic backtracking under speci...

The Lab · 2026-05-04 02:54:06 · GitHub Issues

3. Express Gateway Adds ReDoS Mitigation as path-to-regexp Vulnerability Exposes CPU Exhaustion Risk

A newly merged pull request introduces server-side validation middleware to counter a ReDoS (Regular Expression Denial of Service) vulnerability in `path-to-regexp` versions prior to 0.1.13, which the Express framework depends on transitively. The mitigation, titled `limitPathParams`, caps the number and length of path...