ReDoS Vulnerability in Picomatch Library by Micromatch
CVE-2026-33671

7.5HIGH

Key Information:

Vendor

Micromatch

Status
Vendor
CVE Published:
26 March 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-33671?

The Picomatch library, used for glob pattern matching in JavaScript, is prone to a Regular Expression Denial of Service (ReDoS) attack when processing specially crafted extglob patterns. Specifically, versions before 4.0.4, 3.0.2, and 2.3.2 can become susceptible to catastrophic backtracking on complex non-matching inputs that utilize extglob quantifiers like +() and *(). This issue arises in environments where untrusted users can supply glob patterns to be processed by Picomatch, potentially leading to high CPU consumption and blocking the Node.js event loop, thereby causing a denial of service. Developers are advised to upgrade to the fixed versions or implement measures such as sanitizing glob patterns and applying strict allowlists to mitigate risks.

Affected Version(s)

picomatch >= 4.0.0, < 4.0.4 < 4.0.0, 4.0.4

picomatch >= 3.0.0, < 3.0.2 < 3.0.0, 3.0.2

picomatch < 2.3.2 < 2.3.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.