← Volver a CVEs
CVE-2026-35213
HIGH7.5
Descripcion
@hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susceptible to catastrophic backtracking. This vulnerability is fixed in 6.0.1.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado4/6/2026
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
content_project:content
Debilidades (CWE)
CWE-1333
Referencias
https://github.com/hapijs/content/pull/38(security-advisories@github.com)
https://github.com/hapijs/content/security/advisories/GHSA-jg4p-7fhp-p32p(security-advisories@github.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.