CVE-2026-27903: CWE-407: Inefficient Algorithmic Complexity in isaacs minimatch
CVE-2026-27903 is a high-severity vulnerability in the isaacs minimatch library, a JavaScript utility for converting glob patterns to regular expressions. The flaw arises from inefficient algorithmic complexity in the matchOne() function, which performs unbounded recursive backtracking when glob patterns contain multiple non-adjacent GLOBSTAR (**) segments and the input path does not match. This leads to exponential time complexity, causing the Node. js event loop to stall for several seconds, enabling denial-of-service (DoS) attacks. Attackers can exploit this by supplying crafted glob patterns in contexts such as build tools, task runners, CI/CD pipelines, or multi-tenant systems that accept user-controlled glob inputs. No authentication or user interaction is required if the pattern input is part of the feature. Fixed versions starting from 10. 2. 3 and others listed address this issue. Organizations using vulnerable versions should update immediately to prevent service disruption.
AI Analysis
Technical Summary
The vulnerability CVE-2026-27903 affects the isaacs minimatch library, widely used in JavaScript environments to convert glob expressions into RegExp objects. The core issue lies in the matchOne() function's handling of glob patterns containing multiple non-adjacent GLOBSTAR (**) segments. When such patterns are processed against input paths that do not match, the function executes unbounded recursive backtracking without memoization or bounding mechanisms, resulting in a combinatorial explosion of recursive calls. The time complexity is binomial, O(C(n,k)), where n is the number of path segments and k is the number of globstars. For example, with k=11 and n=30, the function stalls for approximately 5 seconds; with k=13, it exceeds 15 seconds. This inefficiency can be exploited by attackers who can influence the glob pattern input, causing denial-of-service by stalling the Node.js event loop. The attack surface includes developer tools like ESLint, Webpack, Rollup, multi-tenant systems sharing processes, admin interfaces accepting glob-based filters, and CI/CD pipelines evaluating user-submitted configurations. The vulnerability affects multiple versions prior to 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3. The CVSS v3.1 score is 7.5 (high severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits are reported in the wild yet. The issue is fixed in the specified patched versions.
Potential Impact
This vulnerability can cause denial-of-service conditions by stalling the Node.js event loop for several seconds per invocation of minimatch with crafted glob patterns. For organizations, this can lead to degraded performance or complete service outages in critical development and deployment pipelines, especially those relying on JavaScript-based build tools, task runners, or CI/CD systems that accept user-supplied glob patterns. Multi-tenant environments are particularly at risk, as one tenant's malicious input can impact others sharing the same process. The inability to process glob patterns efficiently can delay builds, linting, bundling, or deployment tasks, causing operational disruptions and potential cascading failures in automated workflows. Although no confidentiality or integrity impacts are present, the availability impact is significant. The ease of exploitation without authentication or user interaction increases the risk, especially in publicly accessible or shared environments.
Mitigation Recommendations
Organizations should immediately upgrade minimatch to the fixed versions: 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, or 3.1.3 depending on their current version. Where upgrading is not immediately feasible, implement input validation to restrict or sanitize glob patterns, specifically limiting the number and placement of GLOBSTAR (**) segments to prevent triggering the exponential backtracking. Employ runtime monitoring to detect unusually long processing times in build or CI/CD tasks that use minimatch. In multi-tenant systems, isolate tenant processes to prevent a single tenant's malicious pattern from impacting others. Consider rate limiting or sandboxing user-supplied glob pattern evaluations. Additionally, review and audit all tools and pipelines that utilize minimatch to identify potential exposure. Finally, maintain awareness of updates from the minimatch project and related dependencies to promptly apply future security patches.
Affected Countries
United States, Germany, United Kingdom, France, Japan, India, Canada, Australia, Netherlands, South Korea, China, Brazil
CVE-2026-27903: CWE-407: Inefficient Algorithmic Complexity in isaacs minimatch
Description
CVE-2026-27903 is a high-severity vulnerability in the isaacs minimatch library, a JavaScript utility for converting glob patterns to regular expressions. The flaw arises from inefficient algorithmic complexity in the matchOne() function, which performs unbounded recursive backtracking when glob patterns contain multiple non-adjacent GLOBSTAR (**) segments and the input path does not match. This leads to exponential time complexity, causing the Node. js event loop to stall for several seconds, enabling denial-of-service (DoS) attacks. Attackers can exploit this by supplying crafted glob patterns in contexts such as build tools, task runners, CI/CD pipelines, or multi-tenant systems that accept user-controlled glob inputs. No authentication or user interaction is required if the pattern input is part of the feature. Fixed versions starting from 10. 2. 3 and others listed address this issue. Organizations using vulnerable versions should update immediately to prevent service disruption.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-27903 affects the isaacs minimatch library, widely used in JavaScript environments to convert glob expressions into RegExp objects. The core issue lies in the matchOne() function's handling of glob patterns containing multiple non-adjacent GLOBSTAR (**) segments. When such patterns are processed against input paths that do not match, the function executes unbounded recursive backtracking without memoization or bounding mechanisms, resulting in a combinatorial explosion of recursive calls. The time complexity is binomial, O(C(n,k)), where n is the number of path segments and k is the number of globstars. For example, with k=11 and n=30, the function stalls for approximately 5 seconds; with k=13, it exceeds 15 seconds. This inefficiency can be exploited by attackers who can influence the glob pattern input, causing denial-of-service by stalling the Node.js event loop. The attack surface includes developer tools like ESLint, Webpack, Rollup, multi-tenant systems sharing processes, admin interfaces accepting glob-based filters, and CI/CD pipelines evaluating user-submitted configurations. The vulnerability affects multiple versions prior to 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3. The CVSS v3.1 score is 7.5 (high severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits are reported in the wild yet. The issue is fixed in the specified patched versions.
Potential Impact
This vulnerability can cause denial-of-service conditions by stalling the Node.js event loop for several seconds per invocation of minimatch with crafted glob patterns. For organizations, this can lead to degraded performance or complete service outages in critical development and deployment pipelines, especially those relying on JavaScript-based build tools, task runners, or CI/CD systems that accept user-supplied glob patterns. Multi-tenant environments are particularly at risk, as one tenant's malicious input can impact others sharing the same process. The inability to process glob patterns efficiently can delay builds, linting, bundling, or deployment tasks, causing operational disruptions and potential cascading failures in automated workflows. Although no confidentiality or integrity impacts are present, the availability impact is significant. The ease of exploitation without authentication or user interaction increases the risk, especially in publicly accessible or shared environments.
Mitigation Recommendations
Organizations should immediately upgrade minimatch to the fixed versions: 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, or 3.1.3 depending on their current version. Where upgrading is not immediately feasible, implement input validation to restrict or sanitize glob patterns, specifically limiting the number and placement of GLOBSTAR (**) segments to prevent triggering the exponential backtracking. Employ runtime monitoring to detect unusually long processing times in build or CI/CD tasks that use minimatch. In multi-tenant systems, isolate tenant processes to prevent a single tenant's malicious pattern from impacting others. Consider rate limiting or sandboxing user-supplied glob pattern evaluations. Additionally, review and audit all tools and pipelines that utilize minimatch to identify potential exposure. Finally, maintain awareness of updates from the minimatch project and related dependencies to promptly apply future security patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T15:19:29.718Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699fa148b7ef31ef0b7796b3
Added to database: 2/26/2026, 1:26:32 AM
Last enriched: 2/26/2026, 1:41:01 AM
Last updated: 2/26/2026, 2:34:26 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumCVE-2026-2498: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bulktheme WP Social Meta
MediumCVE-2026-2489: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in readymadeweb TP2WP Importer
MediumCVE-2026-2029: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in livemesh Livemesh Addons for Beaver Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.