Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1745 articles · 105694 vulns · 36/41 feeds (7d)
← Back to list
7.5
CVE-2026-33671EXPLOITED
micromatch · picomatch

Picomatch has a ReDoS vulnerability via extglob quantifiers

Description

Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.

Affected Products

VendorProductVersions
micromatchpicomatchnpm/picomatch: >= 4.0.0, < 4.0.4, npm/picomatch: >= 3.0.0, < 3.0.2, npm/picomatch: < 2.3.2

References

  • https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj(x_refsource_CONFIRM)
  • https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d(x_refsource_MISC)

Related News (2 articles)

Tier A
Microsoft MSRC5h ago
CVE-2026-33671 Picomatch has a ReDoS vulnerability via extglob quantifiers
→ No new info (linked only)
Tier C
VulDB2d ago
CVE-2026-33671 | micromatch picomatch up to 2.3.1/3.0.1/4.0.3 redos
→ No new info (linked only)
CVSS 3.17.5 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-1333
Published3/26/2026
Last enriched2d agov3
Trending Score67
Source articles2
Independent2
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v3
Last enriched 2d ago
v3Tier C2d ago

Updated affected versions to include < 2.3.2, < 3.0.2, < 4.0.4 and marked the vulnerability as actively exploited.

activelyExploited
via VulDB
v2Tier C2d ago

Updated affected versions to include < 2.3.2, < 3.0.2, < 4.0.4 and marked the vulnerability as actively exploited.

affectedVersions
via VulDB
v12d ago

Initial creation