Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27903: CWE-407: Inefficient Algorithmic Complexity in isaacs minimatch

0
High
VulnerabilityCVE-2026-27903cvecve-2026-27903cwe-407
Published: Thu Feb 26 2026 (02/26/2026, 01:06:32 UTC)
Source: CVE Database V5
Vendor/Project: isaacs
Product: minimatch

Description

CVE-2026-27903 is a high-severity vulnerability in the isaacs minimatch library, a JavaScript utility for converting glob patterns to regular expressions. The flaw arises from inefficient algorithmic complexity in the matchOne() function, which performs unbounded recursive backtracking when glob patterns contain multiple non-adjacent GLOBSTAR (**) segments and the input path does not match. This leads to exponential time complexity, causing the Node. js event loop to stall for several seconds, enabling denial-of-service (DoS) attacks. Attackers can exploit this by supplying crafted glob patterns in contexts such as build tools, task runners, CI/CD pipelines, or multi-tenant systems that accept user-controlled glob inputs. No authentication or user interaction is required if the pattern input is part of the feature. Fixed versions starting from 10. 2. 3 and others listed address this issue. Organizations using vulnerable versions should update immediately to prevent service disruption.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:41:01 UTC

Technical Analysis

The vulnerability CVE-2026-27903 affects the isaacs minimatch library, widely used in JavaScript environments to convert glob expressions into RegExp objects. The core issue lies in the matchOne() function's handling of glob patterns containing multiple non-adjacent GLOBSTAR (**) segments. When such patterns are processed against input paths that do not match, the function executes unbounded recursive backtracking without memoization or bounding mechanisms, resulting in a combinatorial explosion of recursive calls. The time complexity is binomial, O(C(n,k)), where n is the number of path segments and k is the number of globstars. For example, with k=11 and n=30, the function stalls for approximately 5 seconds; with k=13, it exceeds 15 seconds. This inefficiency can be exploited by attackers who can influence the glob pattern input, causing denial-of-service by stalling the Node.js event loop. The attack surface includes developer tools like ESLint, Webpack, Rollup, multi-tenant systems sharing processes, admin interfaces accepting glob-based filters, and CI/CD pipelines evaluating user-submitted configurations. The vulnerability affects multiple versions prior to 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3. The CVSS v3.1 score is 7.5 (high severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits are reported in the wild yet. The issue is fixed in the specified patched versions.

Potential Impact

This vulnerability can cause denial-of-service conditions by stalling the Node.js event loop for several seconds per invocation of minimatch with crafted glob patterns. For organizations, this can lead to degraded performance or complete service outages in critical development and deployment pipelines, especially those relying on JavaScript-based build tools, task runners, or CI/CD systems that accept user-supplied glob patterns. Multi-tenant environments are particularly at risk, as one tenant's malicious input can impact others sharing the same process. The inability to process glob patterns efficiently can delay builds, linting, bundling, or deployment tasks, causing operational disruptions and potential cascading failures in automated workflows. Although no confidentiality or integrity impacts are present, the availability impact is significant. The ease of exploitation without authentication or user interaction increases the risk, especially in publicly accessible or shared environments.

Mitigation Recommendations

Organizations should immediately upgrade minimatch to the fixed versions: 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, or 3.1.3 depending on their current version. Where upgrading is not immediately feasible, implement input validation to restrict or sanitize glob patterns, specifically limiting the number and placement of GLOBSTAR (**) segments to prevent triggering the exponential backtracking. Employ runtime monitoring to detect unusually long processing times in build or CI/CD tasks that use minimatch. In multi-tenant systems, isolate tenant processes to prevent a single tenant's malicious pattern from impacting others. Consider rate limiting or sandboxing user-supplied glob pattern evaluations. Additionally, review and audit all tools and pipelines that utilize minimatch to identify potential exposure. Finally, maintain awareness of updates from the minimatch project and related dependencies to promptly apply future security patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.718Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699fa148b7ef31ef0b7796b3

Added to database: 2/26/2026, 1:26:32 AM

Last enriched: 2/26/2026, 1:41:01 AM

Last updated: 2/26/2026, 2:34:26 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats