CVE-2026-33750

Source
https://cve.org/CVERecord?id=CVE-2026-33750
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-33750.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-33750
Aliases
Downstream
Related
Published
2026-03-27T14:04:52.297Z
Modified
2026-05-18T06:00:00.502993236Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
brace-expansion: Zero-step sequence causes process hang and memory exhaustion
Details

The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., {1..2..0}) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to expand() to ensure a step value of 0 is not used.

Database specific
{
    "cwe_ids": [
        "CWE-400"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33750.json"
}
References

Affected packages

Git / github.com/juliangruber/brace-expansion

Affected ranges

Type
GIT
Repo
https://github.com/juliangruber/brace-expansion
Events

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-33750.json"