{"id":"CVE-2026-33750","summary":"brace-expansion: Zero-step sequence causes process hang and memory exhaustion","details":"The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used.","aliases":["GHSA-f886-m6hf-6m8v"],"modified":"2026-04-10T05:42:55.182230Z","published":"2026-03-27T14:04:52.297Z","related":["CGA-gfhp-qv7m-jq4m"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33750.json","cwe_ids":["CWE-400"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33750.json"},{"type":"WEB","url":"https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113"},{"type":"WEB","url":"https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184"},{"type":"FIX","url":"https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5"},{"type":"FIX","url":"https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2"},{"type":"FIX","url":"https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a"},{"type":"REPORT","url":"https://github.com/juliangruber/brace-expansion/issues/98"},{"type":"FIX","url":"https://github.com/juliangruber/brace-expansion/pull/95"},{"type":"FIX","url":"https://github.com/juliangruber/brace-expansion/pull/96"},{"type":"FIX","url":"https://github.com/juliangruber/brace-expansion/pull/97"},{"type":"ADVISORY","url":"https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33750"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/juliangruber/brace-expansion","events":[{"introduced":"6a39bdddcf944374b475d99b0e8292d3727c7ebe"},{"fixed":"87939017c6cb6be56b98c6fa2059b073315cd534"}],"database_specific":{"versions":[{"introduced":"4.0.0"},{"fixed":"5.0.5"}]}},{"type":"GIT","repo":"https://github.com/juliangruber/brace-expansion","events":[{"introduced":"b01a637b0578a7c59acc7d8386f11f8d0710b512"},{"fixed":"67ff947eb70ec5d57961f9e09b205487498fc4ed"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"fixed":"3.0.2"}]}},{"type":"GIT","repo":"https://github.com/juliangruber/brace-expansion","events":[{"introduced":"0b6a022491103b806770bc037654744bef3e63be"},{"fixed":"73b5459d2ab973c984d01324769d306f66440c7e"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.0.3"}]}},{"type":"GIT","repo":"https://github.com/juliangruber/brace-expansion","events":[{"introduced":"0"},{"fixed":"6c353caf23beb9644f858eb3fe38d43a68b82898"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.1.13"}]}}],"versions":["v1.0.0","v1.0.1","v1.1.0","v1.1.1","v1.1.10","v1.1.11","v1.1.12","v1.1.2","v1.1.3","v1.1.4","v1.1.5","v1.1.6","v1.1.7","v1.1.8","v1.1.9","v2.0.0","v2.0.1","v2.0.2","v3.0.0","v3.0.1","v4.0.0","v4.0.1","v5.0.2","v5.0.3","v5.0.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33750.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}