Inefficient Regular Expression Complexity Affecting nodejs:22/nodejs-docs package, versions <1:22.22.2-1.module_el8.10.0+4158+e796f37f


Severity

Recommended
0.0
high
0
10

Based on AlmaLinux security rating.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Inefficient Regular Expression Complexity vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALMALINUX8-NODEJS-16089275
  • published16 Apr 2026
  • disclosed9 Apr 2026

Introduced: 9 Apr 2026

NewCVE-2026-26996  (opens in a new tab)
CWE-1333  (opens in a new tab)

How to fix?

Upgrade AlmaLinux:8 nodejs:22/nodejs-docs to version 1:22.22.2-1.module_el8.10.0+4158+e796f37f or higher.
This issue was patched in ALSA-2026:7123.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nodejs:22/nodejs-docs package and not the nodejs:22/nodejs-docs package as distributed by AlmaLinux. See How to fix? for AlmaLinux:8 relevant fixed versions and status.

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.

CVSS Base Scores

version 3.1