We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54365

fastapi-guard patch contains bypassable RegEx



Description

fastapi-guard is a security library for FastAPI that provides middleware to control IPs, log requests, detect penetration attempts and more. In version 3.0.1, the regular expression patched to mitigate the ReDoS vulnerability by limiting the length of string fails to catch inputs that exceed this limit. This type of patch fails to detect cases in which the string representing the attributes of a <script> tag exceeds 100 characters. As a result, most of the regex patterns present in version 3.0.1 can be bypassed. This is fixed in version 3.0.2.

Reserved 2025-07-21 | Published 2025-07-23 | Updated 2025-07-24 | Assigner GitHub_M


HIGH: 7.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-20: Improper Input Validation

CWE-185: Incorrect Regular Expression

Product status

>= 3.0.1, < 3.0.2
affected

References

github.com/...-guard/security/advisories/GHSA-rrf6-pxg8-684g

github.com/...ommit/0829292c322d33dc14ab00c5451c5c138148035a

github.com/...ommit/d9d50e8130b7b434cdc1b001b8cfd03a06729f7f

cve.org (CVE-2025-54365)

nvd.nist.gov (CVE-2025-54365)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54365

Support options

Helpdesk Chat, Email, Knowledgebase