CVE-2026-33750
EUVD-2026-1662027.03.2026, 15:16
The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used.EnginsightAffected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| juliangruber | brace-expansion | 𝑥 < 1.1.13 |
| juliangruber | brace-expansion | 2.0.0 ≤ 𝑥 < 2.0.3 |
| juliangruber | brace-expansion | 3.0.0 ≤ 𝑥 < 3.0.2 |
| juliangruber | brace-expansion | 5.0.0 ≤ 𝑥 < 5.0.5 |
𝑥
= Vulnerable software versions
Debian Releases
References