Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3293: Inefficient Regular Expression Complexity in snowflakedb snowflake-jdbc

0
Medium
VulnerabilityCVE-2026-3293cvecve-2026-3293
Published: Fri Feb 27 2026 (02/27/2026, 05:32:09 UTC)
Source: CVE Database V5
Vendor/Project: snowflakedb
Product: snowflake-jdbc

Description

CVE-2026-3293 is a medium-severity vulnerability in snowflakedb's snowflake-jdbc versions up to 4. 0. 1. It involves inefficient regular expression complexity in the SdkProxyRoutePlanner component when processing the nonProxyHosts argument. This flaw can be exploited locally by an attacker with limited privileges to cause performance degradation or denial of service due to excessive resource consumption. No user interaction or network access is required, and the vulnerability does not impact confidentiality or integrity. Although the exploit is publicly available, no known active exploitation in the wild has been reported. A patch has been released to address this issue, and applying it is strongly recommended to mitigate potential local denial of service scenarios.

AI-Powered Analysis

AILast updated: 02/27/2026, 05:57:26 UTC

Technical Analysis

The vulnerability identified as CVE-2026-3293 affects the snowflake-jdbc library, specifically versions 4.0.0 and 4.0.1. The issue resides in the SdkProxyRoutePlanner class within the JDBC URL Handler component, where the nonProxyHosts argument is processed using regular expressions. Due to inefficient regular expression complexity, an attacker with local access and limited privileges can craft input that triggers excessive backtracking or resource consumption during regex evaluation. This results in a potential denial of service through performance degradation. The vulnerability does not require network access or user interaction, but local execution privileges are necessary. The flaw does not compromise data confidentiality or integrity but impacts availability by slowing or halting the affected process. The vulnerability has a CVSS 4.8 (medium) score, reflecting its limited attack vector and impact. A patch identified by commit 5fb0a8a318a2ed87f4022a1f56e742424ba94052 has been released by snowflakedb to remediate this issue. No known exploits have been observed in the wild, but the exploit code is publicly available, increasing the risk of local attacks if systems remain unpatched.

Potential Impact

The primary impact of CVE-2026-3293 is on system availability due to inefficient regex processing leading to potential denial of service conditions. Organizations using vulnerable versions of snowflake-jdbc may experience degraded performance or application hangs if an attacker with local access exploits this flaw. While the attack requires local privileges, it could be leveraged by malicious insiders or through chained vulnerabilities that grant local code execution. The vulnerability does not affect confidentiality or integrity, limiting the scope of damage to service disruption. In environments where snowflake-jdbc is used extensively for database connectivity, such disruptions could impact business operations, data analytics workflows, and application stability. Since the exploit is publicly available, the risk of exploitation increases over time if patches are not applied. However, the lack of network attack vector and no user interaction requirement reduce the likelihood of widespread remote exploitation.

Mitigation Recommendations

To mitigate CVE-2026-3293, organizations should promptly apply the official patch released by snowflakedb, identified by commit 5fb0a8a318a2ed87f4022a1f56e742424ba94052, which addresses the inefficient regex handling in the SdkProxyRoutePlanner component. Additionally, restrict local access to systems running vulnerable versions of snowflake-jdbc to trusted users only, minimizing the risk of local exploitation. Implement monitoring and alerting for unusual resource consumption or application hangs related to JDBC connections. Conduct regular audits of software versions and dependencies to ensure timely updates. Where possible, employ application whitelisting and privilege restrictions to prevent unauthorized local code execution that could lead to exploitation. Finally, consider isolating critical database connectivity components to reduce the attack surface and impact of potential denial of service attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-26T18:34:00.508Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a12e7632ffcdb8a2ebeaaf

Added to database: 2/27/2026, 5:41:10 AM

Last enriched: 2/27/2026, 5:57:26 AM

Last updated: 2/27/2026, 6:41:40 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses