CVE-2026-4867 | Teknoloji dünyasından en güncel haberleri ve güvenlikle ilgili gelişmeleri takip edin.

Impact: A bad regular expression is generated any time you have three or more parameters within a single segment, separated by something that is not a period (…
High CVSS: 7.5

CVE-2026-4867

Impact:

A bad regular expression is generated any time you have three or more parameters within a single segment, separated by something that is not a period (.). For example, /:a-:b-:c or /:a-:b-:c-:d. The backtrack protection added in path-to-regexp@0.1.12 only prevents ambiguity for two parameters. With three or more, the generated lookahead does not block single separator characters, so capture groups overlap and cause catastrophic backtracking.

Patches:

Upgrade to path-to-regexp@0.1.13

Custom regex patterns in route definitions (e.g., /:a-:b([^-/]+)-:c([^-/]+)) are not affected because they override the default capture group.

Workarounds:

All versions can be patched by providing a custom regular expression for parameters after the first in a single segment. As long as the custom regular expression does not match the text before the parameter, you will be safe. For example, change /:a-:b-:c to /:a-:b([^-/]+)-:c([^-/]+).

If paths cannot be rewritten and versions cannot be upgraded, another alternative is to limit the URL length.
Vendor
-
Product
-
CWE
CWE-1333
Yayın Tarihi
2026-03-26 17:16:42
Güncelleme
2026-03-30 13:26:50
Source Identifier
ce714d77-add3-4f53-aff5-83d477b104bb
KEV Date Added
-

Kategoriler

Referanslar