CVE-2026-35213

HIGH

Regular Expression Denial of Service (ReDoS) in @hapi/content HTTP header parsing

Title source: cna
STIX 2.1

Description

@hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susceptible to catastrophic backtracking. This vulnerability is fixed in 6.0.1.

Scores

CVSS v3 7.5
EPSS 0.0036
EPSS Percentile 58.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-1333
Status published
Products (3)
content_project/content < 6.0.1
hapi/content 0 - 6.0.1npm
hapijs/content < 6.0.1
Published Apr 06, 2026
Tracked Since Apr 07, 2026