CVE-2026-35213
@hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susceptible to catastrophic backtracking. This vulnerability is fixed in 6.0.1.
Vendor
-
Product
-
CWE
Yayın Tarihi
2026-04-06 21:16:20
Güncelleme
2026-04-07 13:20:11
Source Identifier
security-advisories@github.com
KEV Date Added
-