Regular expression deinal of service in apprise
Description
Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack on an inefficient regular expression. The vulnerable regular expression is here. The problem has been patched in release version 0.9.5.1. Users who are unable to upgrade are advised to remove apprise/plugins/NotifyIFTTT.py to eliminate the service.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
apprisePyPI | < 0.9.5.1 | 0.9.5.1 |
Affected products
1Patches
1e20fce630d55Slight bulletproofing to IFTTT regex handling (#436)
1 file changed · +1 −1
apprise/plugins/NotifyIFTTT.py+1 −1 modified@@ -355,7 +355,7 @@ def parse_native_url(url): result = re.match( r'^https?://maker\.ifttt\.com/use/' r'(?P<webhook_id>[A-Z0-9_-]+)' - r'/?(?P<events>([A-Z0-9_-]+/?)+)?' + r'((?P<events>(/[A-Z0-9_-]+)+))?' r'/?(?P<params>\?.+)?$', url, re.I) if result:
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- github.com/advisories/GHSA-qhmp-h54x-38qrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-39229ghsaADVISORY
- github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.pyghsax_refsource_MISCWEB
- github.com/caronc/apprise/commit/e20fce630d55e4ca9b0a1e325a5fea6997489831ghsaWEB
- github.com/caronc/apprise/pull/436ghsax_refsource_MISCWEB
- github.com/caronc/apprise/releases/tag/v0.9.5.1ghsaWEB
- github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qrghsax_refsource_CONFIRMWEB
- github.com/pypa/advisory-database/tree/main/vulns/apprise/PYSEC-2021-327.yamlghsaWEB
News mentions
0No linked articles in our index yet.