Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/node-path-to-regexp@1.0.1-1?distro=trixie
purl pkg:deb/debian/node-path-to-regexp@1.0.1-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-vzcu-mpsr-qbgm path-to-regexp vulnerable to Regular Expression Denial of Service via multiple route parameters ### Impact A bad regular expression is generated any time you have three or more parameters within a single segment, separated by something that is not a period (`.`). For example, `/:a-:b-:c` or `/:a-:b-:c-:d`. The backtrack protection added in `path-to-regexp@0.1.12` only prevents ambiguity for two parameters. With three or more, the generated lookahead does not block single separator characters, so capture groups overlap and cause catastrophic backtracking. ### Patches Upgrade to [path-to-regexp@0.1.13](https://github.com/pillarjs/path-to-regexp/releases/tag/v.0.1.13) Custom regex patterns in route definitions (e.g., `/:a-:b([^-/]+)-:c([^-/]+)`) are not affected because they override the default capture group. ### Workarounds All versions can be patched by providing a custom regular expression for parameters after the first in a single segment. As long as the custom regular expression does not match the text before the parameter, you will be safe. For example, change `/:a-:b-:c` to `/:a-:b([^-/]+)-:c([^-/]+)`. If paths cannot be rewritten and versions cannot be upgraded, another alternative is to limit the URL length. ### References - [GHSA-9wv6-86v2-598j](https://github.com/advisories/GHSA-9wv6-86v2-598j) - [Detailed blog post: ReDoS the web](https://blakeembrey.com/posts/2024-09-web-redos/) CVE-2026-4867
GHSA-37ch-88jc-xwx2

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T10:47:15.699794+00:00 Debian Importer Fixing VCID-vzcu-mpsr-qbgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T07:18:00.105837+00:00 Debian Importer Fixing VCID-vzcu-mpsr-qbgm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:47:13.569857+00:00 Debian Importer Fixing VCID-vzcu-mpsr-qbgm https://security-tracker.debian.org/tracker/data/json 38.1.0