CVE-2026-4926: path-to-regexp vulnerable to Denial of Service via sequential optional groups
A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as {a}{b}{c}:z. The generated regex grows exponentially with the number of groups, causing denial of service.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-4926 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →