PT-2026-40718 · Pypi · Nautobot

Published

2026-05-13

·

Updated

2026-05-13

·

CVE-2026-44796

CVSS v3.1

6.5

Medium

VectorAV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact

Nautobot UI object-bulk-rename endpoints (for example, /dcim/interfaces/rename/) were vulnerable to application-wide denial of service via maliciously crafted regular expressions in the find field in combination with the use regex flag.

Patches

A general-purpose timeout has been added to these endpoints in Nautobot v2.4.33 and v3.1.2, which ensures that the request will fail early with an appropriate message if regular expression evaluation takes more than a short period of time, instead of continuing to execute for an indefinite duration.

Workarounds

No known workaround has been identified at this time.

References

Fix

Resource Exhaustion

DoS

Weakness Enumeration

Related Identifiers

CVE-2026-44796
GHSA-QRPW-GJVH-X5GM

Affected Products

Nautobot