CVE-2026-27903
Isaacs · minimatch
The minimatch library, a JavaScript utility for glob matching, is vulnerable to a flaw that could result in application instability or unauthorized processing of malicious expressions.
Executive summary
The minimatch JavaScript library contains a high-severity vulnerability that could allow attackers to trigger a denial-of-service or compromise application logic through malformed glob expressions.
Vulnerability
This vulnerability involves the way the minimatch utility converts glob expressions into JavaScript Regular Expressions. An attacker providing a specially crafted input string could potentially trigger a Regular Expression Denial of Service (ReDoS) or bypass intended matching logic.
Business impact
Because minimatch is a foundational dependency in many Node.js applications and build tools, a vulnerability here has a wide-reaching impact. Exploitation could result in significant application downtime, increased CPU consumption on servers, or the bypassing of security filters that rely on glob matching for file or path authorization. The CVSS score of 7.5 reflects these substantial operational risks.
Remediation
Immediate Action: Update the minimatch package to the latest version via npm or your preferred package manager and redeploy affected applications.
Proactive Monitoring: Monitor application performance for sudden spikes in CPU usage, which may indicate an attempt to exploit a ReDoS vulnerability.
Compensating Controls: Implement input validation to sanitize and limit the length and complexity of user-provided strings that are passed to glob-matching functions.
Exploitation status
Public Exploit Available: false
Analyst recommendation
It is critical to identify all internal applications and CI/CD pipelines that utilize the minimatch library. Immediate updates are required to ensure that these applications remain resilient against denial-of-service attacks and to maintain the integrity of path-matching security controls.