Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26996: CWE-1333: Inefficient Regular Expression Complexity in isaacs minimatch

0
High
VulnerabilityCVE-2026-26996cvecve-2026-26996cwe-1333
Published: Fri Feb 20 2026 (02/20/2026, 03:05:21 UTC)
Source: CVE Database V5
Vendor/Project: isaacs
Product: minimatch

Description

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:50:40 UTC

Technical Analysis

The vulnerability CVE-2026-26996 affects the isaacs minimatch library, a JavaScript utility that converts glob expressions into regular expressions. Versions 10.2.0 and earlier are susceptible to a Regular Expression Denial of Service (ReDoS) attack due to inefficient handling of patterns containing multiple consecutive '*' wildcards followed by a literal character absent from the test string. Each '*' wildcard compiles into a separate non-greedy regex group ([^/]*?), and when the regex engine attempts to match the pattern against a string that does not contain the literal character, it backtracks exponentially across all possible group splits. The time complexity of this backtracking is O(4^N), where N is the number of '*' characters. For example, with 15 '*' characters, a single minimatch() call can take approximately 2 seconds, and with 34, it can hang indefinitely. This behavior can be exploited by an attacker supplying crafted glob patterns as input to applications using minimatch, causing denial of service by exhausting CPU resources. The vulnerability requires no authentication or user interaction and affects any application that uses vulnerable minimatch versions with user-controlled pattern input. The issue was addressed and fixed in minimatch version 10.2.1. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges or user interaction required, and a high impact on availability.

Potential Impact

This vulnerability can lead to denial of service conditions in applications that rely on minimatch for pattern matching, especially when processing user-supplied glob patterns. Attackers can exploit this flaw remotely without authentication or user interaction, causing significant CPU resource exhaustion and application unavailability. This can disrupt services, degrade performance, and potentially lead to cascading failures in systems dependent on these applications. Organizations using minimatch in web servers, build tools, package managers, or any JavaScript-based services that accept glob patterns are at risk. The impact is particularly severe for high-availability environments and critical infrastructure where downtime or degraded service can cause operational and reputational damage. Although no known exploits are reported in the wild yet, the low complexity and high impact make this a critical concern for developers and security teams.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of the minimatch library to version 10.2.1 or later, where the vulnerability has been fixed. Additionally, applications should implement input validation and sanitization to restrict or reject glob patterns containing excessive consecutive '*' wildcards, especially when followed by literals unlikely to appear in target strings. Rate limiting and resource usage monitoring can help detect and mitigate potential abuse attempts. Developers should audit their codebases and dependencies to identify where minimatch is used and ensure that user-controlled input is never passed unchecked as a pattern argument. Employing Web Application Firewalls (WAFs) or runtime protection tools that can detect abnormal regex processing times may provide additional defense layers. Finally, educating developers about secure pattern usage and the risks of ReDoS attacks is recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T01:41:24.607Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6997d231d7880ec89b52f4e3

Added to database: 2/20/2026, 3:17:05 AM

Last enriched: 2/28/2026, 2:50:40 PM

Last updated: 4/6/2026, 9:00:10 AM

Views: 1566

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses