Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2327: Regular Expression Denial of Service (ReDoS) in markdown-it

0
Medium
VulnerabilityCVE-2026-2327cvecve-2026-2327
Published: Thu Feb 12 2026 (02/12/2026, 05:00:07 UTC)
Source: CVE Database V5
Product: markdown-it

Description

Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.

AI-Powered Analysis

AILast updated: 02/12/2026, 06:00:51 UTC

Technical Analysis

CVE-2026-2327 is a Regular Expression Denial of Service (ReDoS) vulnerability found in the markdown-it package, a popular JavaScript library used to parse and render markdown content. The vulnerability exists in versions from 13.0.0 up to 14.1.1 due to the use of the regular expression /\*+$/ within the linkify function. This regex is designed to match trailing asterisks but is susceptible to catastrophic backtracking when presented with a long sequence of asterisks followed by a character that does not match the pattern. An attacker can exploit this by crafting markdown input containing a large number of consecutive asterisks followed by a non-matching character, causing the regex engine to consume excessive CPU resources while attempting to resolve the pattern. This leads to a denial-of-service condition by degrading application performance or causing it to become unresponsive. The vulnerability does not require any privileges, authentication, or user interaction, making it remotely exploitable wherever markdown-it processes untrusted input. The CVSS 4.0 base score of 6.9 reflects a medium severity, considering the network attack vector, low attack complexity, and no required privileges or user interaction. No known exploits are currently reported in the wild. The vulnerability affects any application or service that uses markdown-it for markdown parsing, including web applications, content management systems, and developer tools that accept markdown input from external or untrusted sources.

Potential Impact

For European organizations, this vulnerability poses a risk of service disruption through denial-of-service attacks targeting applications that utilize markdown-it for markdown processing. This can affect web services, APIs, and content platforms that accept user-generated markdown content, leading to degraded performance or outages. The impact is particularly relevant for organizations in sectors relying heavily on collaborative documentation, content publishing, or developer tooling, such as technology companies, media, and education. Disruptions could result in loss of availability, impacting business operations and user experience. While the vulnerability does not directly compromise confidentiality or integrity, the denial of service could be leveraged as part of a broader attack strategy to distract or degrade defenses. Additionally, organizations with automated markdown processing pipelines may face operational delays or failures. The medium severity suggests that while the threat is significant, it is not critical, but still warrants prompt remediation to maintain service reliability and security posture.

Mitigation Recommendations

The primary mitigation is to upgrade markdown-it to a version later than 14.1.1 where the vulnerable regex has been fixed or replaced. If immediate upgrading is not feasible, organizations should implement input validation to detect and reject markdown inputs containing suspiciously long sequences of asterisks or other patterns that could trigger the ReDoS. Rate limiting and request throttling on endpoints processing markdown content can reduce the risk of large-scale exploitation. Additionally, deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious markdown payloads can provide a protective layer. Monitoring application performance metrics and logs for unusual CPU spikes or slowdowns during markdown processing can help detect attempted exploitation. Developers should review markdown processing workflows to isolate untrusted input handling and consider sandboxing or resource limiting regex operations. Regularly applying security patches and maintaining dependency hygiene through automated tools will reduce exposure to similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
snyk
Date Reserved
2026-02-11T07:02:27.771Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698d69274b57a58fa1db4942

Added to database: 2/12/2026, 5:46:15 AM

Last enriched: 2/12/2026, 6:00:51 AM

Last updated: 2/12/2026, 7:37:37 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats