CVE-2026-27903

Isaacs · minimatch

The minimatch library, a JavaScript utility for glob matching, is vulnerable to a flaw that could result in application instability or unauthorized processing of malicious expressions.

Executive summary

The minimatch JavaScript library contains a high-severity vulnerability that could allow attackers to trigger a denial-of-service or compromise application logic through malformed glob expressions.

Vulnerability

This vulnerability involves the way the minimatch utility converts glob expressions into JavaScript Regular Expressions. An attacker providing a specially crafted input string could potentially trigger a Regular Expression Denial of Service (ReDoS) or bypass intended matching logic.

Business impact

Because minimatch is a foundational dependency in many Node.js applications and build tools, a vulnerability here has a wide-reaching impact. Exploitation could result in significant application downtime, increased CPU consumption on servers, or the bypassing of security filters that rely on glob matching for file or path authorization. The CVSS score of 7.5 reflects these substantial operational risks.

Remediation

Immediate Action: Update the minimatch package to the latest version via npm or your preferred package manager and redeploy affected applications.

Proactive Monitoring: Monitor application performance for sudden spikes in CPU usage, which may indicate an attempt to exploit a ReDoS vulnerability.

Compensating Controls: Implement input validation to sanitize and limit the length and complexity of user-provided strings that are passed to glob-matching functions.

Exploitation status

Public Exploit Available: false

Analyst recommendation

It is critical to identify all internal applications and CI/CD pipelines that utilize the minimatch library. Immediate updates are required to ensure that these applications remain resilient against denial-of-service attacks and to maintain the integrity of path-matching security controls.