Vulnerability Details CVE-2026-24001
jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1, attempting to parse a patch whose filename headers contain the line break characters `\r`, `\u2028`, or `\u2029` can cause the `parsePatch` method to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory. Applications are therefore likely to be vulnerable to a denial-of-service attack if they call `parsePatch` with a user-provided patch as input. A large payload is not needed to trigger the vulnerability, so size limits on user input do not provide any protection. Furthermore, some applications may be vulnerable even when calling `parsePatch` on a patch generated by the application itself if the user is nonetheless able to control the filename headers (e.g. by directly providing the filenames of the files to be diffed). The `applyPatch` method is similarly affected if (and only if) called with a string representation of a patch as an argument, since under the hood it parses that string using `parsePatch`. Other methods of the library are unaffected. Finally, a second and lesser interdependent bug - a ReDOS - also exhibits when those same line break characters are present in a patch's *patch* header (also known as its "leading garbage"). A maliciously-crafted patch header of length *n* can take `parsePatch` O(*n*³) time to parse. Versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1 contain a fix. As a workaround, do not attempt to parse patches that contain any of these characters: `\r`, `\u2028`, or `\u2029`.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 4.9%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-24001
-
cpe:2.3:a:kpdecker:jsdiff:1.0.1
-
cpe:2.3:a:kpdecker:jsdiff:1.0.2
-
cpe:2.3:a:kpdecker:jsdiff:1.0.3
-
cpe:2.3:a:kpdecker:jsdiff:1.0.4
-
cpe:2.3:a:kpdecker:jsdiff:1.0.5
-
cpe:2.3:a:kpdecker:jsdiff:1.0.6
-
cpe:2.3:a:kpdecker:jsdiff:1.0.7
-
cpe:2.3:a:kpdecker:jsdiff:1.0.8
-
cpe:2.3:a:kpdecker:jsdiff:1.1.0
-
cpe:2.3:a:kpdecker:jsdiff:1.2.0
-
cpe:2.3:a:kpdecker:jsdiff:1.2.1
-
cpe:2.3:a:kpdecker:jsdiff:1.2.2
-
cpe:2.3:a:kpdecker:jsdiff:1.3.0
-
cpe:2.3:a:kpdecker:jsdiff:1.3.1
-
cpe:2.3:a:kpdecker:jsdiff:1.3.2
-
cpe:2.3:a:kpdecker:jsdiff:1.4.0
-
cpe:2.3:a:kpdecker:jsdiff:2.0.0
-
cpe:2.3:a:kpdecker:jsdiff:2.0.1
-
cpe:2.3:a:kpdecker:jsdiff:2.0.2
-
cpe:2.3:a:kpdecker:jsdiff:2.1.0
-
cpe:2.3:a:kpdecker:jsdiff:2.1.1
-
cpe:2.3:a:kpdecker:jsdiff:2.1.2
-
cpe:2.3:a:kpdecker:jsdiff:2.1.3
-
cpe:2.3:a:kpdecker:jsdiff:2.2.0
-
cpe:2.3:a:kpdecker:jsdiff:2.2.1
-
cpe:2.3:a:kpdecker:jsdiff:2.2.2
-
cpe:2.3:a:kpdecker:jsdiff:2.2.3
-
cpe:2.3:a:kpdecker:jsdiff:3.0.0
-
cpe:2.3:a:kpdecker:jsdiff:3.0.1
-
cpe:2.3:a:kpdecker:jsdiff:3.1.0
-
cpe:2.3:a:kpdecker:jsdiff:3.2.0
-
cpe:2.3:a:kpdecker:jsdiff:3.3.0
-
cpe:2.3:a:kpdecker:jsdiff:3.3.1
-
cpe:2.3:a:kpdecker:jsdiff:3.4.0
-
cpe:2.3:a:kpdecker:jsdiff:3.5.0
-
cpe:2.3:a:kpdecker:jsdiff:4.0.0
-
cpe:2.3:a:kpdecker:jsdiff:4.0.1
-
cpe:2.3:a:kpdecker:jsdiff:4.0.2
-
cpe:2.3:a:kpdecker:jsdiff:5.0.0
-
cpe:2.3:a:kpdecker:jsdiff:5.1.0
-
cpe:2.3:a:kpdecker:jsdiff:5.2.0
-
cpe:2.3:a:kpdecker:jsdiff:5.2.1
-
cpe:2.3:a:kpdecker:jsdiff:6.0.0
-
cpe:2.3:a:kpdecker:jsdiff:7.0.0
-
cpe:2.3:a:kpdecker:jsdiff:8.0.0
-
cpe:2.3:a:kpdecker:jsdiff:8.0.1
-
cpe:2.3:a:kpdecker:jsdiff:8.0.2