CVE-2026-25547: CWE-1333: Inefficient Regular Expression Complexity in isaacs brace-expansion
CVE-2026-25547 is a critical denial of service vulnerability in versions of the @isaacs/brace-expansion library prior to 5. 0. 1. The issue arises from inefficient handling of numeric brace ranges, where repeated ranges cause exponential growth in expansion attempts, leading to excessive CPU and memory consumption. This can crash Node. js processes using the vulnerable library without requiring authentication or user interaction. The vulnerability has a CVSS 4. 0 base score of 9. 2, indicating critical severity. It affects applications and services that incorporate this library for pattern expansion, particularly in JavaScript/TypeScript environments.
AI Analysis
Technical Summary
CVE-2026-25547 identifies a denial of service vulnerability in the @isaacs/brace-expansion library, a widely used JavaScript/TypeScript package for expanding brace patterns. The vulnerability stems from inefficient regular expression complexity related to unbounded numeric brace range expansions. When an attacker supplies a specially crafted input containing repeated numeric brace ranges, the library attempts to synchronously generate every possible combination. Because the number of combinations grows exponentially with the number of ranges, even small inputs can cause the process to consume excessive CPU and memory resources. This resource exhaustion can lead to crashes or hangs of Node.js processes that incorporate the vulnerable library, resulting in denial of service. The vulnerability requires no authentication or user interaction and can be triggered remotely if the application processes untrusted input through this library. The issue affects all versions of @isaacs/brace-expansion prior to 5.0.1, where the problem has been fixed. The CVSS 4.0 score of 9.2 reflects the critical impact on availability and the ease of exploitation. Although no known exploits are currently observed in the wild, the vulnerability poses a significant risk to applications that rely on this package for pattern expansion, including web servers, build tools, and automation scripts. The vulnerability is classified under CWE-1333, which relates to inefficient regular expression complexity leading to denial of service.
Potential Impact
For European organizations, this vulnerability can cause significant disruption to services that depend on Node.js applications using the vulnerable @isaacs/brace-expansion library. Denial of service attacks exploiting this issue can lead to application crashes, degraded performance, and potential downtime, impacting business continuity and user experience. Organizations in sectors such as finance, e-commerce, telecommunications, and government services that rely on Node.js-based infrastructure are particularly at risk. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Additionally, supply chain risks exist if third-party dependencies or internal tools incorporate the vulnerable library. The impact extends to cloud-hosted services and on-premises deployments alike, potentially affecting critical services and causing reputational damage. Given the critical CVSS score, the vulnerability demands urgent remediation to prevent exploitation and maintain service availability.
Mitigation Recommendations
European organizations should immediately audit their software dependencies to identify usage of @isaacs/brace-expansion versions prior to 5.0.1, including indirect dependencies pulled in by other packages. Upgrading all instances of the library to version 5.0.1 or later is the primary mitigation step. Organizations should implement dependency management tools that enforce version policies and monitor for vulnerable packages. Additionally, input validation and sanitization should be applied to any user-supplied patterns processed by the library to limit the complexity and size of brace expansions. Rate limiting and resource usage monitoring can help detect and mitigate denial of service attempts. For critical production environments, consider isolating services that process untrusted input or running them with resource constraints to prevent system-wide impact. Regularly update Node.js and related dependencies to incorporate security patches. Finally, incorporate this vulnerability into incident response and threat modeling exercises to prepare for potential exploitation scenarios.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland, Poland, Italy
CVE-2026-25547: CWE-1333: Inefficient Regular Expression Complexity in isaacs brace-expansion
Description
CVE-2026-25547 is a critical denial of service vulnerability in versions of the @isaacs/brace-expansion library prior to 5. 0. 1. The issue arises from inefficient handling of numeric brace ranges, where repeated ranges cause exponential growth in expansion attempts, leading to excessive CPU and memory consumption. This can crash Node. js processes using the vulnerable library without requiring authentication or user interaction. The vulnerability has a CVSS 4. 0 base score of 9. 2, indicating critical severity. It affects applications and services that incorporate this library for pattern expansion, particularly in JavaScript/TypeScript environments.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25547 identifies a denial of service vulnerability in the @isaacs/brace-expansion library, a widely used JavaScript/TypeScript package for expanding brace patterns. The vulnerability stems from inefficient regular expression complexity related to unbounded numeric brace range expansions. When an attacker supplies a specially crafted input containing repeated numeric brace ranges, the library attempts to synchronously generate every possible combination. Because the number of combinations grows exponentially with the number of ranges, even small inputs can cause the process to consume excessive CPU and memory resources. This resource exhaustion can lead to crashes or hangs of Node.js processes that incorporate the vulnerable library, resulting in denial of service. The vulnerability requires no authentication or user interaction and can be triggered remotely if the application processes untrusted input through this library. The issue affects all versions of @isaacs/brace-expansion prior to 5.0.1, where the problem has been fixed. The CVSS 4.0 score of 9.2 reflects the critical impact on availability and the ease of exploitation. Although no known exploits are currently observed in the wild, the vulnerability poses a significant risk to applications that rely on this package for pattern expansion, including web servers, build tools, and automation scripts. The vulnerability is classified under CWE-1333, which relates to inefficient regular expression complexity leading to denial of service.
Potential Impact
For European organizations, this vulnerability can cause significant disruption to services that depend on Node.js applications using the vulnerable @isaacs/brace-expansion library. Denial of service attacks exploiting this issue can lead to application crashes, degraded performance, and potential downtime, impacting business continuity and user experience. Organizations in sectors such as finance, e-commerce, telecommunications, and government services that rely on Node.js-based infrastructure are particularly at risk. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Additionally, supply chain risks exist if third-party dependencies or internal tools incorporate the vulnerable library. The impact extends to cloud-hosted services and on-premises deployments alike, potentially affecting critical services and causing reputational damage. Given the critical CVSS score, the vulnerability demands urgent remediation to prevent exploitation and maintain service availability.
Mitigation Recommendations
European organizations should immediately audit their software dependencies to identify usage of @isaacs/brace-expansion versions prior to 5.0.1, including indirect dependencies pulled in by other packages. Upgrading all instances of the library to version 5.0.1 or later is the primary mitigation step. Organizations should implement dependency management tools that enforce version policies and monitor for vulnerable packages. Additionally, input validation and sanitization should be applied to any user-supplied patterns processed by the library to limit the complexity and size of brace expansions. Rate limiting and resource usage monitoring can help detect and mitigate denial of service attempts. For critical production environments, consider isolating services that process untrusted input or running them with resource constraints to prevent system-wide impact. Regularly update Node.js and related dependencies to incorporate security patches. Finally, incorporate this vulnerability into incident response and threat modeling exercises to prepare for potential exploitation scenarios.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T19:59:47.376Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6983c169f9fa50a62faf7b09
Added to database: 2/4/2026, 10:00:09 PM
Last enriched: 2/12/2026, 7:44:14 AM
Last updated: 3/24/2026, 12:37:17 AM
Views: 250
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.