CVE-2026-33285

HIGH

LiquidJS: memoryLimit Bypass through Negative Range Values Leads to Process Crash

Title source: cna

Description

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allowing an attacker to allocate unlimited memory. Combined with a string flattening operation (e.g., `replace` filter), this causes a V8 Fatal error that crashes the Node.js process, resulting in complete denial of service from a single HTTP request. Version 10.25.1 patches the issue.

Scores

CVSS v3 7.5
EPSS 0.0010
EPSS Percentile 26.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-20 CWE-400
Status published
Products (3)
harttle/liquidjs < 10.25.1
liquidjs/liquidjs < 10.25.1
npm/liquidjs 0npm
Published Mar 26, 2026
Tracked Since Mar 26, 2026