Avatar

Labs / Regex Bypass to SQLi

  • Challenge
  • Released 27 Oct 2025

🎯 One character. One flag. Can you exploit the regex?

A corporate directory validates user input with a regex pattern and Python's re.MULTILINE flag. The developers are confident their ^[a-z0-9 ]+$ pattern blocks all SQL injection attempts. They don't realize that MULTILINE changes how ^ and $ anchors behave. Security researchers know that a single control character can split validation logic across lines, bypassing even careful regex checks. Exploit this documented vulnerability and demonstrate why regex patterns cannot secure SQL queries.

1
Flags
1
Points
Challenge
Free Access
Start Lab Environment

Launch your dedicated AWS machine to begin hacking

~1-2 min setup
AWS dedicated
Private instance
Industry standard
Flag
+1 point
First Blood by r3dkzyoud at 2025-10-27 18:10:09.0