Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jg4p-7fhp-p32p | @hapi/content: Regular Expression Denial of Service (ReDoS) in HTTP header parsing |
Thu, 16 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Content Project
Content Project content |
|
| CPEs | cpe:2.3:a:content_project:content:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Content Project
Content Project content |
|
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hapijs
Hapijs content |
|
| Vendors & Products |
Hapijs
Hapijs content |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | @hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susceptible to catastrophic backtracking. This vulnerability is fixed in 6.0.1. | |
| Title | Regular Expression Denial of Service (ReDoS) in @hapi/content HTTP header parsing | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T14:02:06.943Z
Reserved: 2026-04-01T18:48:58.937Z
Link: CVE-2026-35213
No data.
Status : Analyzed
Published: 2026-04-06T21:16:20.433
Modified: 2026-04-16T04:26:29.743
Link: CVE-2026-35213
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:37:17Z
Github GHSA