An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04dzd3LTY3bXctcjVwN84AAvLq

generator-jhipster vulnerable to login check Regular Expression Denial of Service


For applications using JWT or session-based authentication (not OIDC), users can input a login string which can cause a denial of service, as parsing it will be too complex.

Here is an example:

The vulnerable expression was never officially released. So only when you generated an application from the master branch between 6.8.0 and 6.9.0 your generated application may be vulnerable.


If you only used official releases you don't need to patch your application.


If you have created an application from the master branch, you need to adapt the LOGIN_REGEX in If your regex is


you need to change it too


If you still have ^[_.@A-Za-z0-9-]*$ there is no need to change it, except you would like to support login with + sign (e.g. [email protected]).


Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: over 1 year ago

Identifiers: GHSA-8w7w-67mw-r5p7
References: Repository:
Blast Radius: 0.0

Affected Packages

Dependent packages: 198
Dependent repositories: 12,842
Downloads: 111,520 last month
Affected Version Ranges: > 6.8.0, < 6.9.0
No known fixed version
All affected versions: