Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5239-wwwm-4pmq | Pygments has Regular Expression Denial of Service (ReDoS) due to Inefficient Regex for GUID Matching |
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pygments
Pygments pygments |
|
| Vendors & Products |
Pygments
Pygments pygments |
Sun, 22 Mar 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in pygments up to 2.19.2. The impacted element is the function AdlLexer of the file pygments/lexers/archetype.py. The manipulation results in inefficient regular expression complexity. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | pygments archetype.py AdlLexer redos | |
| Weaknesses | CWE-1333 CWE-400 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-23T16:08:49.809Z
Reserved: 2026-03-21T09:10:23.929Z
Link: CVE-2026-4539
Updated: 2026-03-23T16:08:43.157Z
Status : Deferred
Published: 2026-03-22T06:16:20.913
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-4539
OpenCVE Enrichment
Updated: 2026-03-25T14:46:37Z
Github GHSA