Vulnerability Details CVE-2026-33750
The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 6.6%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2026-33750
-
cpe:2.3:a:juliangruber:brace-expansion:0.0.0
-
cpe:2.3:a:juliangruber:brace-expansion:1.0.0
-
cpe:2.3:a:juliangruber:brace-expansion:1.0.1
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.0
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.1
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.10
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.11
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.12
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.2
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.3
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.4
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.5
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.6
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.7
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.8
-
cpe:2.3:a:juliangruber:brace-expansion:1.1.9
-
cpe:2.3:a:juliangruber:brace-expansion:2.0.0
-
cpe:2.3:a:juliangruber:brace-expansion:2.0.1
-
cpe:2.3:a:juliangruber:brace-expansion:2.0.2
-
cpe:2.3:a:juliangruber:brace-expansion:3.0.0
-
cpe:2.3:a:juliangruber:brace-expansion:3.0.1
-
cpe:2.3:a:juliangruber:brace-expansion:5.0.0
-
cpe:2.3:a:juliangruber:brace-expansion:5.0.2
-
cpe:2.3:a:juliangruber:brace-expansion:5.0.3
-
cpe:2.3:a:juliangruber:brace-expansion:5.0.4