Skip to content

Menu
  • Home
Menu

CVE-2026-26996 – minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern

Posted on February 20, 2026
CVE ID : CVE-2026-26996

Published : Feb. 20, 2026, 3:16 a.m. | 46 minutes ago

Description : minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn’t appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8’s regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.

Severity: 8.7 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Post Views: 7

Site map

  • About Us
  • Privacy Policy
  • Terms & Conditions of Use
©2026 | Design: Newspaperly WordPress Theme