Description
Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.
Published: 2026-02-12
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A regular expression denial of service vulnerability exists in the markdown-it JavaScript library due to the use of the pattern /\*+$/ within its linkify routine. When an attacker supplies a long sequence of asterisks followed by a non‑matching character, the regex engine performs excessive backtracking which can exhaust system resources and cause the host application to become unresponsive. This weakness is classified as CWE‑1333 and can compromise the availability of any service that renders Markdown using markdown‑it without additional safeguards.

Affected Systems

The vulnerability affects all versions of the markdown‑it package released before 14.1.1, including the version range 13.0.0 through 14.1.0. The affected product is the markdown‑it project’s library, which is commonly used in Node.js applications for Markdown parsing. Upgrading to version 14.1.1 or later resolves the issue.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, while the EPSS score of less than 1% suggests that exploitation is currently unlikely but not impossible. The vulnerability is not listed in the CISA KEV catalog. The most probable attack vector is that an attacker supplies malicious Markdown content – for example, an input field, comment feed, or API payload – that is parsed by the application. Because the flaw is in a regular expression, it does not require elevated privileges; any user who can submit data that passes through markdown‑it can trigger the denial of service.

Generated by OpenCVE AI on April 17, 2026 at 20:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade markdown‑it to version 14.1.1 or newer.
  • If an upgrade is delayed, disable the linkify feature or configure the parser to exclude linkification.
  • Implement input validation to restrict the length of asterisks or overall Markdown payload before parsing.

Generated by OpenCVE AI on April 17, 2026 at 20:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-38c4-r59v-3vqw markdown-it is has a Regular Expression Denial of Service (ReDoS)
History

Mon, 23 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Markdown-it Project
Markdown-it Project markdown-it
CPEs cpe:2.3:a:markdown-it_project:markdown-it:*:*:*:*:*:*:*:*
Vendors & Products Markdown-it Project
Markdown-it Project markdown-it

Fri, 13 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Title markdown-it: markdown-it: Denial of Service via Regular Expression Denial of Service in linkify function
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 12 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Markdown-it
Markdown-it markdown-it
Vendors & Products Markdown-it
Markdown-it markdown-it

Thu, 12 Feb 2026 05:45:00 +0000

Type Values Removed Values Added
Description Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.
Weaknesses CWE-1333
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Markdown-it Markdown-it
Markdown-it Project Markdown-it
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2026-02-12T14:41:53.714Z

Reserved: 2026-02-11T07:02:27.771Z

Link: CVE-2026-2327

cve-icon Vulnrichment

Updated: 2026-02-12T14:41:22.399Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-12T06:16:02.243

Modified: 2026-02-23T14:08:11.870

Link: CVE-2026-2327

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-12T05:00:07Z

Links: CVE-2026-2327 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:15:26Z

Weaknesses