GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://growi.co.jp/news/44/ |
|
| https://jvn.jp/en/jp/JVN46728373/ |
|
History
Thu, 23 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string. | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-04-23T06:59:38.451Z
Reserved: 2026-04-16T08:21:20.314Z
Link: CVE-2026-41040
No data.
Status : Received
Published: 2026-04-23T07:16:41.070
Modified: 2026-04-23T07:16:41.070
Link: CVE-2026-41040
No data.
OpenCVE Enrichment
No data.
Weaknesses