View all vulnerabilities

CVE-2023-30608

sqlparse contains a regular expression that is vulnerable to Regular Expression Denial of Service

### ImpactThe SQL parser contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The vulnerability may lead to Denial of Service (DoS).### PatchesThis issues has been fixed in sqlparse 0.4.4.### WorkaroundsNone. ### ReferencesThis issue was discovered and reported by GHSL team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).- Commit that introduced the vulnerability: e75e35869473832a1eb67772b1adfee2db11b85a

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
5.4
Score Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Versions
sqlparse >= 0.1.15 < 0.4.4
Severity
Medium
Ecosystem
Python
Publish Date
April 21, 2023
Modified Date
February 13, 2025