Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/21616?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21616?format=api", "vulnerability_id": "VCID-q4u6-6pbw-5bcq", "summary": "@isaacs/brace-expansion has Uncontrolled Resource Consumption\n### Summary\n\n`@isaacs/brace-expansion` is vulnerable to a Denial of Service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process.\n\n### Details\n\nThe vulnerability occurs because `@isaacs/brace-expansion` expands brace expressions without any upper bound or complexity limit. Expansion is performed eagerly and synchronously, meaning the full result set is generated before returning control to the caller.\n\nFor example, the following input:\n\n```\n{0..99}{0..99}{0..99}{0..99}{0..99}\n```\n\nproduces:\n\n```\n100^5 = 10,000,000,000 combinations\n```\n\nThis exponential growth can quickly overwhelm the event loop and heap memory, resulting in process termination.\n\n### Proof of Concept\n\nThe following script reliably triggers the issue.\n\nCreate `poc.js`:\n\n```js\nconst { expand } = require('@isaacs/brace-expansion');\n\nconst pattern = '{0..99}{0..99}{0..99}{0..99}{0..99}';\n\nconsole.log('Starting expansion...');\nexpand(pattern);\n```\n\nRun it:\n\n```bash\nnode poc.js\n```\n\nThe process will freeze and typically crash with an error such as:\n\n```\nFATAL ERROR: JavaScript heap out of memory\n```\n\n### Impact\n\nThis is a denial of service vulnerability. Any application or downstream dependency that uses `@isaacs/brace-expansion` on untrusted input may be vulnerable to a single-request crash.\n\nAn attacker does not require authentication and can use a very small payload to:\n\n* Trigger exponential computation\n* Exhaust memory and CPU resources\n* Block the event loop\n* Crash Node.js services relying on this library", "aliases": [ { "alias": "CVE-2026-25547" }, { "alias": "GHSA-7h2j-956f-4vf2" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1041973?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.3%2B~1.1.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.3%252B~1.1.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1055200?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.3%2B~1.1.2-2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.3%252B~1.1.2-2" }, { "url": "http://public2.vulnerablecode.io/api/packages/64054?format=api", "purl": "pkg:npm/%40isaacs/brace-expansion@5.0.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/%2540isaacs/brace-expansion@5.0.1" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/932112?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.0-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q2nx-7z24-13dd" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" }, { "vulnerability": "VCID-ugqu-gsa9-y7fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/994770?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.0-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q2nx-7z24-13dd" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" }, { "vulnerability": "VCID-ugqu-gsa9-y7fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.0-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994771?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.1-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q2nx-7z24-13dd" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" }, { "vulnerability": "VCID-ugqu-gsa9-y7fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.1-2" }, { "url": "http://public2.vulnerablecode.io/api/packages/932110?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.1-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q2nx-7z24-13dd" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" }, { "vulnerability": "VCID-ugqu-gsa9-y7fq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932114?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.1%2B~1.1.0-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q2nx-7z24-13dd" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.1%252B~1.1.0-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/994772?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.1%2B~1.1.0-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q2nx-7z24-13dd" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.1%252B~1.1.0-2" }, { "url": "http://public2.vulnerablecode.io/api/packages/932113?format=api", "purl": "pkg:deb/debian/node-brace-expansion@2.0.3%2B~1.1.2-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q4u6-6pbw-5bcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-brace-expansion@2.0.3%252B~1.1.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/147297?format=api", "purl": "pkg:npm/%40isaacs/brace-expansion@5.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q4u6-6pbw-5bcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/%2540isaacs/brace-expansion@5.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1060002?format=api", "purl": "pkg:rpm/redhat/nodejs22@1:22.22.2-1?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-gv39-q6pw-yfh4" }, { "vulnerability": "VCID-hgd1-7u6j-p7dh" }, { "vulnerability": "VCID-hzsn-68be-dkej" }, { "vulnerability": "VCID-kq3k-xr3z-z3c4" }, { "vulnerability": "VCID-n6ew-t7g1-33gn" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" }, { "vulnerability": "VCID-sy2z-sqgk-d7hg" }, { "vulnerability": "VCID-z7ac-jr58-gkfm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs22@1:22.22.2-1%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1060001?format=api", "purl": "pkg:rpm/redhat/nodejs22@1:22.22.2-2?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-gv39-q6pw-yfh4" }, { "vulnerability": "VCID-hgd1-7u6j-p7dh" }, { "vulnerability": "VCID-hzsn-68be-dkej" }, { "vulnerability": "VCID-kq3k-xr3z-z3c4" }, { "vulnerability": "VCID-n6ew-t7g1-33gn" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" }, { "vulnerability": "VCID-sy2z-sqgk-d7hg" }, { "vulnerability": "VCID-z7ac-jr58-gkfm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs22@1:22.22.2-2%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066717?format=api", "purl": "pkg:rpm/redhat/nodejs24@1:24.14.1-2?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-fetp-hvhq-dube" }, { "vulnerability": "VCID-gv39-q6pw-yfh4" }, { "vulnerability": "VCID-hgd1-7u6j-p7dh" }, { "vulnerability": "VCID-hzsn-68be-dkej" }, { "vulnerability": "VCID-n6ew-t7g1-33gn" }, { "vulnerability": "VCID-ph2p-u33d-8yh3" }, { "vulnerability": "VCID-q4u6-6pbw-5bcq" }, { "vulnerability": "VCID-sy2z-sqgk-d7hg" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-vdca-exd1-rfce" }, { "vulnerability": "VCID-xert-byqc-xbe2" }, { "vulnerability": "VCID-z7ac-jr58-gkfm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs24@1:24.14.1-2%3Farch=el10_1" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05144", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0519", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05773", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05412", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05369", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05566", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05603", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05609", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05664", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05752", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05764", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05767", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/isaacs/brace-expansion", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/isaacs/brace-expansion" }, { "reference_url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" }, { "value": "9.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-05T14:24:50Z/" } ], "url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127313", "reference_id": "1127313", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127313" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942", "reference_id": "2436942", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942" }, { "reference_url": "https://github.com/advisories/GHSA-7h2j-956f-4vf2", "reference_id": "GHSA-7h2j-956f-4vf2", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-7h2j-956f-4vf2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080", "reference_id": "RHSA-2026:7080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123", "reference_id": "RHSA-2026:7123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7123" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302", "reference_id": "RHSA-2026:7302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310", "reference_id": "RHSA-2026:7310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350", "reference_id": "RHSA-2026:7350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675", "reference_id": "RHSA-2026:7675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983", "reference_id": "RHSA-2026:7983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7983" } ], "weaknesses": [ { "cwe_id": 1333, "name": "Inefficient Regular Expression Complexity", "description": "The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 409, "name": "Improper Handling of Highly Compressed Data (Data Amplification)", "description": "The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output." } ], "exploits": [], "severity_range_score": "6.5 - 9.2", "exploitability": "0.5", "weighted_severity": "8.3", "risk_score": 4.2, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4u6-6pbw-5bcq" }