Vulnerability Details CVE-2026-35213
@hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susceptible to catastrophic backtracking. This vulnerability is fixed in 6.0.1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 79.0%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-35213
-
cpe:2.3:a:content_project:content:1.0.0
-
cpe:2.3:a:content_project:content:1.0.1
-
cpe:2.3:a:content_project:content:1.0.2
-
cpe:2.3:a:content_project:content:2.0.0
-
cpe:2.3:a:content_project:content:3.0.0
-
cpe:2.3:a:content_project:content:3.0.1
-
cpe:2.3:a:content_project:content:3.0.2
-
cpe:2.3:a:content_project:content:3.0.3
-
cpe:2.3:a:content_project:content:3.0.4
-
cpe:2.3:a:content_project:content:3.0.5
-
cpe:2.3:a:content_project:content:3.0.6
-
cpe:2.3:a:content_project:content:3.0.7
-
cpe:2.3:a:content_project:content:4.0.0
-
cpe:2.3:a:content_project:content:4.0.1
-
cpe:2.3:a:content_project:content:4.0.2
-
cpe:2.3:a:content_project:content:4.0.3
-
cpe:2.3:a:content_project:content:4.0.4
-
cpe:2.3:a:content_project:content:4.0.5
-
cpe:2.3:a:content_project:content:4.0.6