REGEXVAULTv2.0
Web & Network/URL
Verified Safe

URL with Query String Regex for JavaScript

/^https?://[^\s/?#]+(?:/[^\s?#]*)?\?([^\s#]*)(?:#[^\s]*)?$/i

What this pattern does

This page provides a well-structured, multi-part regular expression for matching url with query string, ported and verified for JavaScript. A rigorously tested regex reduces debugging time and protects your application from edge-case failures. The snippet below is ready to drop into your JavaScript project — whether you're validating in an Express middleware, a Next.js API route, or a client-side form.

Javascript Implementation

Javascript
// URL with Query String
// ReDoS-safe | RegexVault — Web & Network > URL

const urlWithQueryStringRegex = /^https?:\/\/[^\s\/?#]+(?:\/[^\s?#]*)?\?([^\s#]*)(?:#[^\s]*)?$/i;

function validateUrlWithQueryString(input: string): boolean {
  return urlWithQueryStringRegex.test(input);
}

// Example
console.log(validateUrlWithQueryString("https://example.com?q=hello")); // true

Test Cases

Matches (Valid)
Rejects (Invalid)
https://example.com?q=hellohttps://example.com/no-query
http://example.com/search?q=world&page=2ftp://example.com?query=1
https://api.example.com/v1/users?active=true&sort=name#tophttps://example.com
https://example.com/?foo=barnot a url
http://example.com?https://example.com#fragment-only

When to use this pattern

This pattern is drawn from the Web & Network > URL category and carries a ReDoS-safe certification. That matters for JavaScript developers because especially critical in long-running Node.js event loops where a ReDoS vulnerability can block the entire process. RegexVault audits patterns against known backtracking attack vectors, ensuring you have the necessary context before using this regex in a high-stakes production environment.

Common Pitfalls

Query string values may be URL-encoded — decode with decodeURIComponent() (JS) or urllib.parse.unquote() (Python) before processing.

Technical Notes

Capture group 1 contains the raw query string. Each component (host, path, query, fragment) uses negated character classes rather than .* for ReDoS safety.

Have a pattern that belongs in the vault?

Submit it for review — community-verified patterns get credited to your GitHub handle. Free submissions join the queue. Priority review available for $15.

Submit a Pattern