CVE-2026-4926
EUVD-2026-1632426.03.2026, 19:17
Impact:
A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service.
Patches:
Fixed in version 8.4.0.
Workarounds:
Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.EnginsightAwaiting analysis
This vulnerability is currently awaiting analysis.
Debian Releases