All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susceptible to catastrophic backtracking.
Denial of Service. An unauthenticated remote attacker can cause a Node.js process to become unresponsive by sending a single HTTP request with a maliciously crafted header value.
Fixed by tightening all three regular expressions to eliminate backtracking.
There are no known workarounds. Upgrade to the patched version.
{
"github_reviewed": true,
"github_reviewed_at": "2026-04-04T04:23:03Z",
"severity": "HIGH",
"nvd_published_at": null,
"cwe_ids": [
"CWE-1333"
]
}