CVE Vulnerabilities

CVE-2026-27904

Inefficient Regular Expression Complexity

Published: Feb 26, 2026 | Modified: Feb 27, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested *() extglobs produce regexps with nested unbounded quantifiers (e.g. (?:(?:a|b)*)*), which exhibit catastrophic backtracking in V8. With a 12-byte pattern *(*(*(a|b))) and an 18-byte non-matching input, minimatch() stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default minimatch() API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects +() extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
MinimatchMinimatch_project*3.1.4 (excluding)
MinimatchMinimatch_project4.0.0 (including)4.2.5 (excluding)
MinimatchMinimatch_project5.0.0 (including)5.1.8 (excluding)
MinimatchMinimatch_project6.0.0 (including)6.2.2 (excluding)
MinimatchMinimatch_project7.0.0 (including)7.4.8 (excluding)
MinimatchMinimatch_project8.0.0 (including)8.0.6 (excluding)
MinimatchMinimatch_project9.0.0 (including)9.0.7 (excluding)
MinimatchMinimatch_project10.0.0 (including)10.2.3 (excluding)

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References