Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33079— Mistune ReDoS in LINK_TITLE_RE allows denial of service with crafted Markdown titles

EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33079

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Mistune ReDoS in LINK_TITLE_RE allows denial of service with crafted Markdown titles
Source: NVD (National Vulnerability Database)
Vulnerability Description
In versions 3.0.0a1 through 3.2.0 of Mistune, there is a ReDoS (Regular Expression Denial of Service) vulnerability in `LINK_TITLE_RE` that allows an attacker who can supply Markdown for parsing to cause denial of service. The regular expression used for parsing link titles contains overlapping alternatives that can trigger catastrophic backtracking. In both the double-quoted and single-quoted branches, a backslash followed by punctuation can be matched either as an escaped punctuation sequence or as two ordinary characters, creating an ambiguous pattern inside a repeated group. If an attacker supplies Markdown containing repeated ! sequences with no closing quote, the regex engine explores an exponential number of backtracking paths. This is reachable through normal Markdown parsing of inline links and block link reference definitions. A small crafted input can therefore cause significant CPU consumption and make applications using Mistune unresponsive.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1333
Source: NVD (National Vulnerability Database)
Vulnerability Title
mistune 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
mistune是Hsiaoming Yang个人开发者的一个快速而强大的 Python Markdown 解析器。 mistune 3.0.0a1版本至3.2.0版本存在安全漏洞,该漏洞源于LINK_TITLE_RE中正则表达式拒绝服务,可能导致攻击者提供Markdown解析时触发灾难性回溯,造成CPU过度消耗。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
lepturemistune >=3.0.0a1, <= 3.2.0 -

II. Public POCs for CVE-2026-33079

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-33079

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-33079

No comments yet


Leave a comment