ajv has ReDoS when using `$data` option
Moderate severity
GitHub Reviewed
Published
Feb 11, 2026
to the GitHub Advisory Database
•
Updated Mar 2, 2026
Package
Affected versions
>= 7.0.0-alpha.0, < 8.18.0
< 6.14.0
Patched versions
8.18.0
6.14.0
Description
Published by the National Vulnerability Database
Feb 11, 2026
Published to the GitHub Advisory Database
Feb 11, 2026
Reviewed
Feb 17, 2026
Last updated
Mar 2, 2026
ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Denial of Service (ReDoS) when the
$dataoption is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($datareference), which is passed directly to the JavaScriptRegExp()constructor without validation. An attacker can inject a malicious regex pattern (e.g.,\"^(a|a)*$\") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with$data: true for dynamic schema validation.References