Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-38c4-r59v-3vqw | markdown-it is has a Regular Expression Denial of Service (ReDoS) |
Mon, 23 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Markdown-it Project
Markdown-it Project markdown-it |
|
| CPEs | cpe:2.3:a:markdown-it_project:markdown-it:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Markdown-it Project
Markdown-it Project markdown-it |
Fri, 13 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | markdown-it: markdown-it: Denial of Service via Regular Expression Denial of Service in linkify function | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 12 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Markdown-it
Markdown-it markdown-it |
|
| Vendors & Products |
Markdown-it
Markdown-it markdown-it |
Thu, 12 Feb 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition. | |
| Weaknesses | CWE-1333 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-02-12T14:41:53.714Z
Reserved: 2026-02-11T07:02:27.771Z
Link: CVE-2026-2327
Updated: 2026-02-12T14:41:22.399Z
Status : Analyzed
Published: 2026-02-12T06:16:02.243
Modified: 2026-02-23T14:08:11.870
Link: CVE-2026-2327
OpenCVE Enrichment
Updated: 2026-04-17T20:15:26Z
Github GHSA