Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.
References
Configurations
No configuration.
History
12 Feb 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/ltduc147/c9abecae1b291ede4f692f2ab988c917 - | |
| References | () https://security.snyk.io/vuln/SNYK-JS-MARKDOWNIT-10666750 - |
12 Feb 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-12 06:16
Updated : 2026-02-12 15:16
NVD link : CVE-2026-2327
Mitre link : CVE-2026-2327
CVE.ORG link : CVE-2026-2327
JSON object : View
Products Affected
No product.
CWE
CWE-1333
Inefficient Regular Expression Complexity
