CVE-2026-4923 | Teknoloji dünyasından en güncel haberleri ve güvenlikle ilgili gelişmeleri takip edin.

Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracki…
Medium CVSS: 5.9

CVE-2026-4923

Impact:

When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path.

Unsafe examples:

/*foo-*bar-:baz
/*a-:b-*c-:d
/x/*a-:b/*c/y

Safe examples:

/*foo-:bar
/*foo-:bar-*baz

Patches:

Upgrade to version 8.4.0.

Workarounds:

If you are using multiple wildcard parameters, you can check the regex output with a tool such as https://makenowjust-labs.github.io/recheck/playground/ to confirm whether a path is vulnerable.
Vendor
-
Product
-
CWE
CWE-1333
Yayın Tarihi
2026-03-26 19:17:08
Güncelleme
2026-03-30 13:26:50
Source Identifier
ce714d77-add3-4f53-aff5-83d477b104bb
KEV Date Added
-

Kategoriler

Referanslar