CVE-2026-33285
HIGHLiquidJS: memoryLimit Bypass through Negative Range Values Leads to Process Crash
Title source: cnaDescription
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allowing an attacker to allocate unlimited memory. Combined with a string flattening operation (e.g., `replace` filter), this causes a V8 Fatal error that crashes the Node.js process, resulting in complete denial of service from a single HTTP request. Version 10.25.1 patches the issue.
Scores
CVSS v3
7.5
EPSS
0.0010
EPSS Percentile
26.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-20
CWE-400
Status
published
Products (3)
harttle/liquidjs
< 10.25.1
liquidjs/liquidjs
< 10.25.1
npm/liquidjs
0npm
Published
Mar 26, 2026
Tracked Since
Mar 26, 2026