CVE-2026-26996

NameCVE-2026-26996
Descriptionminimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1128579

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-minimatch (PTS)bullseye3.0.4+~3.0.3-1+deb11u2vulnerable
bookworm5.1.1+~5.1.2-1vulnerable
forky, sid, trixie9.0.3-6vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-minimatchsource(unstable)(unfixed)1128579

Notes

[trixie] - node-minimatch <no-dsa> (Minor issue)
[bookworm] - node-minimatch <no-dsa> (Minor issue)
https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
Fixed by: https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5 (v10.2.1)

Search for package or bug name: Reporting problems