Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33672: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in micromatch picomatch

0
Medium
VulnerabilityCVE-2026-33672cvecve-2026-33672cwe-1321
Published: Thu Mar 26 2026 (03/26/2026, 21:39:16 UTC)
Source: CVE Database V5
Vendor/Project: micromatch
Product: picomatch

Description

CVE-2026-33672 is a prototype pollution vulnerability in the JavaScript glob matching library picomatch affecting versions prior to 4. 0. 4, 3. 0. 2, and 2. 3. 2. The vulnerability arises from improper handling of POSIX bracket expressions that can reference inherited Object. prototype methods, leading to incorrect glob matching behavior. This can cause security-relevant logic errors in applications relying on picomatch for filtering, validation, or access control.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 13:42:26 UTC

Technical Analysis

Picomatch, a JavaScript glob matcher, suffers from a prototype pollution vulnerability (CWE-1321) in versions before 4.0.4, 3.0.2, and 2.3.2. The vulnerability involves method injection via the POSIX_REGEX_SOURCE object, which inherits from Object.prototype. Specially crafted POSIX bracket expressions like [[:constructor:]] can cause inherited methods to be converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior, potentially causing security logic errors in applications that rely on picomatch for filtering or access control. The vulnerability does not enable remote code execution. The issue is resolved in the specified fixed versions. Mitigations include upgrading, sanitizing or rejecting untrusted glob patterns containing POSIX character classes, avoiding POSIX bracket expressions with user input, or patching the library to use a null prototype for POSIX_REGEX_SOURCE.

Potential Impact

The vulnerability impacts the integrity of glob matching by causing patterns to match unintended filenames. This can lead to security-relevant logic errors in applications that use picomatch for filtering, validation, or access control decisions. There is no impact on confidentiality or availability, and remote code execution is not possible. The issue primarily affects applications processing untrusted or user-controlled glob patterns.

Mitigation Recommendations

A fix is available in picomatch versions 4.0.4, 3.0.2, and 2.3.2. Users should upgrade to one of these versions or later according to their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Additional mitigations include sanitizing or rejecting untrusted glob patterns containing POSIX character classes (e.g., [[:...:]]), avoiding the use of POSIX bracket expressions when user input is involved, or manually patching the library by modifying POSIX_REGEX_SOURCE to use a null prototype. These mitigations reduce the risk of incorrect glob matching behavior caused by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5ac523c064ed76fd41c47

Added to database: 3/26/2026, 9:59:46 PM

Last enriched: 4/3/2026, 1:42:26 PM

Last updated: 5/9/2026, 8:56:56 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses