PT-2026-22079 · Minimatch+2 · Minimatch+2

Dolevmiz1

·

Published

2026-02-26

·

Updated

2026-05-08

·

CVE-2026-27904

CVSS v3.1

7.5

High

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions minimatch versions prior to 10.2.3 minimatch versions prior to 9.0.7 minimatch versions prior to 8.0.6 minimatch versions prior to 7.4.8 minimatch versions prior to 6.2.2 minimatch versions prior to 5.1.8 minimatch versions prior to 4.2.5 minimatch versions prior to 3.1.4
Description The software is susceptible to catastrophic backtracking when processing certain glob expressions containing nested *() or +() extglobs. Specifically, regular expressions generated from these patterns can lead to excessive backtracking in V8, causing significant performance issues, including stalls lasting several seconds or even minutes. A 12-byte pattern like *(*(*(a|b))) with an 18-byte non-matching input can trigger this behavior. The issue occurs with the default minimatch() API without requiring special options.
Recommendations Update to minimatch version 10.2.3 or later. Update to minimatch version 9.0.7 or later. Update to minimatch version 8.0.6 or later. Update to minimatch version 7.4.8 or later. Update to minimatch version 6.2.2 or later. Update to minimatch version 5.1.8 or later. Update to minimatch version 4.2.5 or later. Update to minimatch version 3.1.4 or later.

Exploit

Fix

DoS

Weakness Enumeration

Related Identifiers

ALSA-2026:7080
ALSA-2026:7123
ALSA-2026:7896
ALSA-2026:8339
CLEANSTART-2026-DV49099
CLEANSTART-2026-GS57401
CLEANSTART-2026-SW34937
CVE-2026-27904
GHSA-23C5-XMQV-RM74
RHSA-2026:6277
RHSA-2026:7080
RHSA-2026:7123
RHSA-2026:7302
RHSA-2026:7310
RHSA-2026:7896
RHSA-2026:7983
RHSA-2026:8339
RHSA-2026:9711
RHSA-2026:9874

Affected Products

Red Os
Rocky Linux
Minimatch