Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6q5m-63h6-5x4v | LiquidJS has Exponential Memory Amplification through its replace_first Filter $& Pattern |
Mon, 30 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Liquidjs
Liquidjs liquidjs |
|
| CPEs | cpe:2.3:a:liquidjs:liquidjs:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Liquidjs
Liquidjs liquidjs |
Thu, 26 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Harttle
Harttle liquidjs |
|
| Vendors & Products |
Harttle
Harttle liquidjs |
Thu, 26 Mar 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the matched substring. The filter only charges `memoryLimit` for the input string length, not the amplified output. An attacker can achieve exponential memory amplification (up to 625,000:1) while staying within the `memoryLimit` budget, leading to denial of service. Version 10.25.1 patches the issue. | |
| Title | LiquidJS has Exponential Memory Amplification through its replace_first Filter $& Pattern | |
| Weaknesses | CWE-20 CWE-400 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-26T15:02:26.164Z
Reserved: 2026-03-18T18:55:47.426Z
Link: CVE-2026-33287
Updated: 2026-03-26T14:18:41.797Z
Status : Analyzed
Published: 2026-03-26T01:16:27.530
Modified: 2026-03-30T16:46:03.917
Link: CVE-2026-33287
No data.
OpenCVE Enrichment
Updated: 2026-03-30T20:57:44Z
Github GHSA