You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
The contact us form lacks the following validation properties:
Any user can use a single whitespace and bypass the name input field.
Any email can be used to bypass the email input field as shown in the media.
Impact
Invalid Email Addresses: If users can enter incorrectly formatted email addresses like [email protected] instead of [email protected] as seen in the media can lead to undelivered emails and communication failures.
Typos and Errors can lead to emails like [email protected] instead of [email protected]. These minor errors can prevent users from receiving expected communications.
Spam and Bots: Minimal validation increases the risk of spam and bot submissions. Bots often exploit poorly validated forms to send spam or phishing attempts.
#1979 This PR resolves an issue in the contact form where invalid email addresses were being accepted. A regular expression for email validation has been added to ensure that only properly formatted email addresses (e.g., [email protected]) are allowed.
Please review the changes and provide feedback if further adjustments are needed.
Describe the bug
The contact us form lacks the following validation properties:
Impact
Invalid Email Addresses: If users can enter incorrectly formatted email addresses like [email protected] instead of [email protected] as seen in the media can lead to undelivered emails and communication failures.
Typos and Errors can lead to emails like [email protected] instead of [email protected]. These minor errors can prevent users from receiving expected communications.
Spam and Bots: Minimal validation increases the risk of spam and bot submissions. Bots often exploit poorly validated forms to send spam or phishing attempts.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
The Form should not allow any user to bypass without entering genuine details.
Screenshots
![image](https://private-user-images.githubusercontent.com/95236968/337863967-f357ad18-e5da-4fd0-ad79-468fd83cabe7.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.zfJVfpqw303-XqnrDTpzTPJq6ilZXSIhyhKp3U4rPh0)
Desktop (please complete the following information):
@akshitagupta15june I can handle this issue using combination of regex and possibly domain validation.
The text was updated successfully, but these errors were encountered: