Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q5f6-qxm2-mcqm | tarteaucitron.js has Regular Expression Denial of Service (ReDoS) vulnerability |
Tue, 20 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:amauri:tarteaucitronjs:*:*:*:*:*:node.js:*:* |
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amauri
Amauri tarteaucitronjs |
|
| Vendors & Products |
Amauri
Amauri tarteaucitronjs |
Tue, 13 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | tarteaucitron.js is a compliant and accessible cookie banner. Prior to 1.29.0, a Regular Expression Denial of Service (ReDoS) vulnerability was identified in tarteaucitron.js in the handling of the issuu_id parameter. This vulnerability is fixed in 1.29.0. | |
| Title | tarteaucitron.js has Regular Expression Denial of Service (ReDoS) vulnerability | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-13T19:47:24.567Z
Reserved: 2026-01-09T22:50:10.288Z
Link: CVE-2026-22809
Updated: 2026-01-13T19:47:21.789Z
Status : Analyzed
Published: 2026-01-13T20:16:11.263
Modified: 2026-01-20T16:49:02.293
Link: CVE-2026-22809
No data.
OpenCVE Enrichment
Updated: 2026-04-18T16:30:05Z
Github GHSA