CVE-2026-4926
EUVD-2026-1632426.03.2026, 19:17
Impact:
A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service.
Patches:
Fixed in version 8.4.0.
Workarounds:
Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.EnginsightAffected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| pillarjs | path-to-regexp | 8.0.0 ≤ 𝑥 < 8.4.0 |
𝑥
= Vulnerable software versions
Debian Releases
Vulnerability Media Exposure