CVE-2026-26996

HIGH
中文标题:
(暂无数据)
英文标题:
minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern
CVSS分数: 8.7
发布时间: 2026-02-20 03:05:21
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.

CWE类型:
CWE-1333
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
isaacs minimatch < 10.2.1 - - cpe:2.3:a:isaacs:minimatch:<_10.2.1:*:*:*:*:*:*:*
minimatch_project minimatch * - - cpe:2.3:a:minimatch_project:minimatch:*:*:*:*:*:node.js:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26 x_refsource_CONFIRM
cve.org
访问
https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 x_refsource_MISC
cve.org
访问
CVSS评分详情
4.0 (cna)
HIGH
8.7
CVSS向量: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
机密性
NONE
完整性
NONE
可用性
HIGH
后续系统影响 (Subsequent):
机密性
NONE
完整性
NONE
可用性
NONE
时间信息
发布时间:
2026-02-20 03:05:21
修改时间:
2026-02-20 15:34:15
创建时间:
2026-02-21 06:00:02
更新时间:
2026-03-07 06:00:02
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-26996 2026-02-21 03:19:38 2026-02-20 22:00:02
NVD nvd_CVE-2026-26996 2026-02-21 02:00:04 2026-02-20 22:00:05
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-02-21 06:00:05
affected_products_count: 1 → 2; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 2
  • data_sources: ['cve'] -> ['cve', 'nvd']