Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25547: CWE-1333: Inefficient Regular Expression Complexity in isaacs brace-expansion

0
Critical
VulnerabilityCVE-2026-25547cvecve-2026-25547cwe-1333
Published: Wed Feb 04 2026 (02/04/2026, 21:51:17 UTC)
Source: CVE Database V5
Vendor/Project: isaacs
Product: brace-expansion

Description

CVE-2026-25547 is a critical denial of service vulnerability in versions of the @isaacs/brace-expansion library prior to 5. 0. 1. The issue arises from inefficient handling of numeric brace ranges, where repeated ranges cause exponential growth in expansion attempts, leading to excessive CPU and memory consumption. This can crash Node. js processes using the vulnerable library without requiring authentication or user interaction. The vulnerability has a CVSS 4. 0 base score of 9. 2, indicating critical severity. It affects applications and services that incorporate this library for pattern expansion, particularly in JavaScript/TypeScript environments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:44:14 UTC

Technical Analysis

CVE-2026-25547 identifies a denial of service vulnerability in the @isaacs/brace-expansion library, a widely used JavaScript/TypeScript package for expanding brace patterns. The vulnerability stems from inefficient regular expression complexity related to unbounded numeric brace range expansions. When an attacker supplies a specially crafted input containing repeated numeric brace ranges, the library attempts to synchronously generate every possible combination. Because the number of combinations grows exponentially with the number of ranges, even small inputs can cause the process to consume excessive CPU and memory resources. This resource exhaustion can lead to crashes or hangs of Node.js processes that incorporate the vulnerable library, resulting in denial of service. The vulnerability requires no authentication or user interaction and can be triggered remotely if the application processes untrusted input through this library. The issue affects all versions of @isaacs/brace-expansion prior to 5.0.1, where the problem has been fixed. The CVSS 4.0 score of 9.2 reflects the critical impact on availability and the ease of exploitation. Although no known exploits are currently observed in the wild, the vulnerability poses a significant risk to applications that rely on this package for pattern expansion, including web servers, build tools, and automation scripts. The vulnerability is classified under CWE-1333, which relates to inefficient regular expression complexity leading to denial of service.

Potential Impact

For European organizations, this vulnerability can cause significant disruption to services that depend on Node.js applications using the vulnerable @isaacs/brace-expansion library. Denial of service attacks exploiting this issue can lead to application crashes, degraded performance, and potential downtime, impacting business continuity and user experience. Organizations in sectors such as finance, e-commerce, telecommunications, and government services that rely on Node.js-based infrastructure are particularly at risk. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Additionally, supply chain risks exist if third-party dependencies or internal tools incorporate the vulnerable library. The impact extends to cloud-hosted services and on-premises deployments alike, potentially affecting critical services and causing reputational damage. Given the critical CVSS score, the vulnerability demands urgent remediation to prevent exploitation and maintain service availability.

Mitigation Recommendations

European organizations should immediately audit their software dependencies to identify usage of @isaacs/brace-expansion versions prior to 5.0.1, including indirect dependencies pulled in by other packages. Upgrading all instances of the library to version 5.0.1 or later is the primary mitigation step. Organizations should implement dependency management tools that enforce version policies and monitor for vulnerable packages. Additionally, input validation and sanitization should be applied to any user-supplied patterns processed by the library to limit the complexity and size of brace expansions. Rate limiting and resource usage monitoring can help detect and mitigate denial of service attempts. For critical production environments, consider isolating services that process untrusted input or running them with resource constraints to prevent system-wide impact. Regularly update Node.js and related dependencies to incorporate security patches. Finally, incorporate this vulnerability into incident response and threat modeling exercises to prepare for potential exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.376Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983c169f9fa50a62faf7b09

Added to database: 2/4/2026, 10:00:09 PM

Last enriched: 2/12/2026, 7:44:14 AM

Last updated: 3/24/2026, 12:37:17 AM

Views: 250

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses