{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-41680","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-04-22T03:53:24.406Z","datePublished":"2026-04-24T17:26:27.847Z","dateUpdated":"2026-04-24T19:08:41.300Z"},"containers":{"cna":{"title":"Marked: OOM Denial of Service via Infinite Recursion in marked Tokenizer","problemTypes":[{"descriptions":[{"cweId":"CWE-400","lang":"en","description":"CWE-400: Uncontrolled Resource Consumption","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-674","lang":"en","description":"CWE-674: Uncontrolled Recursion","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-835","lang":"en","description":"CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/markedjs/marked/security/advisories/GHSA-6v9c-7cg6-27q7","tags":["x_refsource_CONFIRM"],"url":"https://github.com/markedjs/marked/security/advisories/GHSA-6v9c-7cg6-27q7"}],"affected":[{"vendor":"markedjs","product":"marked","versions":[{"version":">= 18.0.0, < 18.0.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-04-24T17:26:27.847Z"},"descriptions":[{"lang":"en","value":"Marked is a markdown parser and compiler. From 18.0.0 to 18.0.1, a critical Denial of Service (DoS) vulnerability exists in marked. By providing a specific 3-byte input sequence a tab, a vertical tab, and a newline (\\x09\\x0b\\n)—an unauthenticated attacker can trigger an infinite recursion loop during parsing. This leads to unbounded memory allocation, causing the host Node.js application to crash via Memory Exhaustion (OOM). This vulnerability is fixed in 18.0.2."}],"source":{"advisory":"GHSA-6v9c-7cg6-27q7","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/markedjs/marked/security/advisories/GHSA-6v9c-7cg6-27q7","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-24T19:07:49.403065Z","id":"CVE-2026-41680","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-24T19:08:41.300Z"}}]}}