Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33672: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in micromatch picomatch

0
Medium
VulnerabilityCVE-2026-33672cvecve-2026-33672cwe-1321
Published: Thu Mar 26 2026 (03/26/2026, 21:39:16 UTC)
Source: CVE Database V5
Vendor/Project: micromatch
Product: picomatch

Description

CVE-2026-33672 is a prototype pollution vulnerability in the JavaScript glob matching library picomatch affecting versions prior to 4. 0. 4, 3. 0. 2, and 2. 3. 2. The flaw arises from improper handling of POSIX bracket expressions, allowing method names inherited from Object. prototype to be injected into generated regular expressions. This leads to incorrect glob matching behavior, potentially causing security logic errors in applications relying on picomatch for filtering, validation, or access control.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 22:16:03 UTC

Technical Analysis

Picomatch is a JavaScript library used for glob pattern matching, commonly employed in file filtering and validation tasks. Versions before 4.0.4, 3.0.2, and 2.3.2 contain a vulnerability classified as CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes), also known as prototype pollution. The vulnerability stems from the handling of the POSIX_REGEX_SOURCE object, which inherits from Object.prototype. Attackers can craft malicious POSIX bracket expressions such as `[[:constructor:]]` that reference inherited method names. These methods are implicitly converted to strings and injected into the regular expressions generated by picomatch, causing the glob matcher to behave incorrectly. This results in integrity issues where patterns may match unintended filenames, potentially bypassing security controls that depend on accurate glob matching for filtering or access control. Although this flaw does not allow remote code execution or denial of service, it can lead to security-relevant logic errors in applications processing untrusted glob patterns. The vulnerability affects all users of vulnerable picomatch versions who accept user-controlled input for glob matching. The issue is fixed in picomatch versions 4.0.4, 3.0.2, and 2.3.2. If immediate upgrading is not feasible, users should sanitize or reject untrusted glob patterns, especially those containing POSIX character classes, avoid using POSIX bracket expressions with user input, or patch the library by modifying POSIX_REGEX_SOURCE to have a null prototype, preventing prototype pollution. The CVSS 3.1 score is 5.3, indicating a medium severity with network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact.

Potential Impact

The primary impact of this vulnerability is on the integrity of applications relying on picomatch for glob pattern matching. Incorrect matching can cause security logic errors, such as bypassing filename filters, validation checks, or access control mechanisms that depend on precise glob matching. This can lead to unauthorized access to files or resources, exposure of sensitive data, or execution of unintended operations based on incorrect pattern matches. Since the vulnerability does not allow remote code execution or denial of service, the impact is limited to logical errors rather than system compromise or service disruption. Organizations using picomatch in environments processing untrusted or user-supplied glob patterns are at risk. This includes web applications, build tools, deployment scripts, and any software that filters or validates file paths using picomatch. The medium CVSS score reflects a moderate risk level, but the actual impact depends on the context of usage and the sensitivity of the filtered data or resources.

Mitigation Recommendations

1. Upgrade picomatch to version 4.0.4, 3.0.2, 2.3.2, or later, depending on the supported release line, to apply the official fix. 2. If upgrading is not immediately possible, sanitize or reject untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`. Implement strict input validation to prevent malicious bracket expressions. 3. Avoid using POSIX bracket expressions in glob patterns derived from user input to eliminate the attack vector. 4. Consider patching the picomatch library locally by modifying the POSIX_REGEX_SOURCE object to have a null prototype, preventing prototype pollution. 5. Review application logic relying on glob matching for filtering or access control to detect and mitigate potential bypasses. 6. Implement additional layers of validation or access control independent of glob matching results to reduce risk. 7. Monitor for unusual file access patterns or unexpected matches that could indicate exploitation attempts. 8. Educate developers about the risks of prototype pollution and secure handling of user input in pattern matching contexts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5ac523c064ed76fd41c47

Added to database: 3/26/2026, 9:59:46 PM

Last enriched: 3/26/2026, 10:16:03 PM

Last updated: 3/27/2026, 12:15:31 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses