Regular Expression Denial of Service Vulnerability in @hapi/content HTTP Header Parsing
CVE-2026-35213

8.7HIGH

Key Information:

Vendor

Hapijs

Status
Vendor
CVE Published:
6 April 2026

What is CVE-2026-35213?

The @hapi/content library, used for parsing HTTP Content-* headers, is susceptible to Regular Expression Denial of Service (ReDoS) attacks in all versions up to 6.0.0. This vulnerability arises from the misuse of regular expressions in parsing Content-Type and Content-Disposition headers, leading to potential catastrophic backtracking when confronted with specially crafted input. The issue has been addressed in version 6.0.1, which mitigates the risk posed by these patterns. Users are strongly encouraged to upgrade to the latest version to ensure their systems are secure.

Affected Version(s)

content < 6.0.1

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.