Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-2327

Опубликовано: 12 фев. 2026
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.

A flaw was found in markdown-it. A remote attacker can exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted input containing a long sequence of asterisk characters followed by a non-matching character to the linkify function. This triggers excessive backtracking in the regular expression, leading to a denial-of-service condition.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel9Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-operator-bundleNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-proxy-rhel9Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-rhel9-operatorNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-curator5-rhel9Not affected
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Not affected
Red Hat OpenShift Dev Spacesdevspaces/code-rhel9Not affected
Red Hat OpenShift Dev Spacesdevspaces/code-sshd-rhel9Not affected
Red Hat OpenShift Dev Spacesdevspaces/openvsx-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2439272markdown-it: markdown-it: Denial of Service via Regular Expression Denial of Service in linkify function

EPSS

Процентиль: 5%
0.0002
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 месяца назад

Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.

CVSS3: 5.3
nvd
около 1 месяца назад

Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.

CVSS3: 5.3
debian
около 1 месяца назад

Versions of the package markdown-it from 13.0.0 and before 14.1.1 are ...

CVSS3: 5.3
github
около 1 месяца назад

markdown-it is has a Regular Expression Denial of Service (ReDoS)

EPSS

Процентиль: 5%
0.0002
Низкий

7.5 High

CVSS3