Search for packages
| purl | pkg:deb/debian/node-path-to-regexp@8.4.1-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1vjw-mm86-k7gn | path-to-regexp vulnerable to Denial of Service via sequential optional groups ### Impact A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. ### Patches Fixed in version 8.4.0. ### Workarounds Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns. |
CVE-2026-4926
GHSA-j3q9-mxjg-w52f |
| VCID-366w-k4rs-v7d3 | path-to-regexp vulnerable to Regular Expression Denial of Service via multiple wildcards ### Impact When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path. **Unsafe examples:** ``` /*foo-*bar-:baz /*a-:b-*c-:d /x/*a-:b/*c/y ``` **Safe examples:** ``` /*foo-:bar /*foo-:bar-*baz ``` ### Patches Upgrade to version `8.4.0`. ### Workarounds If developers are using multiple wildcard parameters, they can check the regex output with a tool such as https://makenowjust-labs.github.io/recheck/playground/ to confirm whether a path is vulnerable. |
CVE-2026-4923
GHSA-27v5-c462-wpq7 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-05-01T22:40:31.414639+00:00 | Debian Importer | Fixing | VCID-366w-k4rs-v7d3 | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-05-01T22:14:33.464558+00:00 | Debian Importer | Fixing | VCID-1vjw-mm86-k7gn | https://security-tracker.debian.org/tracker/data/json | 38.6.0 |
| 2026-04-16T09:20:41.636229+00:00 | Debian Importer | Fixing | VCID-1vjw-mm86-k7gn | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-16T09:02:14.172924+00:00 | Debian Importer | Fixing | VCID-366w-k4rs-v7d3 | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-11T18:14:33.090361+00:00 | Debian Importer | Fixing | VCID-1vjw-mm86-k7gn | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-11T18:03:33.031099+00:00 | Debian Importer | Fixing | VCID-366w-k4rs-v7d3 | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-04T18:01:58.091414+00:00 | Debian Importer | Fixing | VCID-1vjw-mm86-k7gn | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-04T17:54:53.736069+00:00 | Debian Importer | Fixing | VCID-366w-k4rs-v7d3 | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |