Impact:
A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service.
Patches:
Fixed in version 8.4.0.
Workarounds:
Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.
References
| Link | Resource |
|---|---|
| https://cna.openjsf.org/security-advisories.html |
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-26 19:17
Updated : 2026-03-30 13:26
NVD link : CVE-2026-4926
Mitre link : CVE-2026-4926
CVE.ORG link : CVE-2026-4926
JSON object : View
Products Affected
No product.
