{"id":"CVE-2020-8124","details":"Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks.","aliases":["GHSA-46c4-8wrp-j99v"],"modified":"2026-05-06T10:43:51.133773Z","published":"2020-02-04T20:15:14.543Z","references":[{"type":"EVIDENCE","url":"https://hackerone.com/reports/496293"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/unshiftio/url-parse","events":[{"introduced":"0"},{"last_affected":"bc9da1ec19a86199be663a7f0ba40091834d73f7"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"1.4.4"}],"cpe":"cpe:2.3:a:url-parse_project:url-parse:*:*:*:*:*:node.js:*:*"}}],"versions":["0.0.4","0.1","0.1.0","0.1.1","0.1.2","0.1.3","0.1.4","0.1.5","0.2","0.2.1","0.2.2","0.2.3","1.0.0","1.0.1","1.0.2","1.0.3","1.0.4","1.0.5","1.1.0","1.1.1","1.1.2","1.1.3","1.1.4","1.1.5","1.1.6","1.1.7","1.1.8","1.1.9","1.2.0","1.3.0","1.4.0","1.4.1","1.4.2","1.4.3","1.4.4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8124.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}