No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Markdown-it
Markdown-it markdown-it |
|
| Vendors & Products |
Markdown-it
Markdown-it markdown-it |
Thu, 12 Feb 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition. | |
| Weaknesses | CWE-1333 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-02-12T14:41:53.714Z
Reserved: 2026-02-11T07:02:27.771Z
Link: CVE-2026-2327
Updated: 2026-02-12T14:41:22.399Z
Status : Awaiting Analysis
Published: 2026-02-12T06:16:02.243
Modified: 2026-02-12T15:16:11.450
Link: CVE-2026-2327
No data.
OpenCVE Enrichment
Updated: 2026-02-12T09:01:59Z