CVE-2026-4926

| EUVD-2026-16324 HIGH
2026-03-26 openjs GHSA-j3q9-mxjg-w52f
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 26, 2026 - 19:16 vuln.today
EUVD ID Assigned
Mar 26, 2026 - 19:16 euvd
EUVD-2026-16324
CVE Published
Mar 26, 2026 - 18:59 nvd
HIGH 7.5

Description

Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

Analysis

The path-to-regexp library versions 8.0.0 through 8.3.0 suffer from catastrophic regular expression denial of service via exponential regex generation when route patterns contain multiple sequential optional groups in curly-brace syntax. Remote unauthenticated attackers can trigger resource exhaustion by submitting crafted route patterns, causing application-level denial of service with CVSS 7.5 (High severity). …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all applications and dependencies using path-to-regexp versions 8.0.0 through 8.3.0 in your environment. Within 7 days: Upgrade affected instances to version 8.4.0 or later. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Vendor Status

Debian

node-path-to-regexp
Release Status Fixed Version Urgency
bullseye vulnerable 6.2.0-1 -
bookworm vulnerable 6.2.1-1 -
trixie vulnerable 6.3.0-1 -
forky, sid vulnerable 8.3.0-1 -
(unstable) fixed (unfixed) -

Share

CVE-2026-4926 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy