|
[Japanese]
|
JVNDB-2026-000064
|
GROWI vulnerable to Regular expression Denial-of-Service (ReDoS)
|
GROWI provided by GROWI, Inc. contains the following vulnerability.- Inefficient regular expression complexity (CWE-1333) - CVE-2026-41040
Sho Odagiri of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to GROWI, Inc. and coordinated. After the coordination was completed, GROWI, Inc. reported the case to JPCERT/CC to notify users of the solution through JVN.
|
CVSS V3 Severity: Base Metrics 7.5 (High) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
|
CVSS v4 Severity
Base Metrics: 8.7 (High) [IPA Score]
- Access Vector (AV): Network
- Attack Complexity (AC): Low
- Attack Requirements (AT): None
- Privileges Required (PR): None
- User Interaction (UI): None
Vulnerable System Impact
- Confidentiality Impact (VC): None
- Integrity Impact (VI): None
- Availability Impact (VA): High
Subsequent System Impact
- Confidentiality Impact (SC): None
- Integrity Impact (SI): None
- Availability Impact (SA): None
|
|
GROWI, Inc.
|
|
An attacker may be able to cause a denial-of-service (DoS) attack.
|
[Update the Software]
Update the software to the latest version.
The developer has released the following version to address this vulnerability. For more details, refer to the information provided by the developer.
|
WESEEK, Inc.
|
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2026-41040
|
- JVN : JVN#46728373
|
- [2026/04/23]
Web page was published
|