Inefficient Regular Expression Complexity Affecting nodejs:22/nodejs-packaging-bundler package, versions <0:2021.06-6.module_el8.10.0+4158+e796f37f


Severity

Recommended
high

Based on AlmaLinux security rating.

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Inefficient Regular Expression Complexity vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALMALINUX8-NODEJS-16089253
  • published16 Apr 2026
  • disclosed9 Apr 2026

Introduced: 9 Apr 2026

NewCVE-2026-25547  (opens in a new tab)
CWE-1333  (opens in a new tab)

How to fix?

Upgrade AlmaLinux:8 nodejs:22/nodejs-packaging-bundler to version 0:2021.06-6.module_el8.10.0+4158+e796f37f or higher.
This issue was patched in ALSA-2026:7123.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nodejs:22/nodejs-packaging-bundler package and not the nodejs:22/nodejs-packaging-bundler package as distributed by AlmaLinux. See How to fix? for AlmaLinux:8 relevant fixed versions and status.

@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.

CVSS Base Scores

version 3.1