CVE-2026-41680 PUBLISHED

Marked: OOM Denial of Service via Infinite Recursion in marked Tokenizer

Assigner: GitHub_M
Reserved: 22.04.2026 Published: 24.04.2026 Updated: 24.04.2026

Marked is a markdown parser and compiler. From 18.0.0 to 18.0.1, a critical Denial of Service (DoS) vulnerability exists in marked. By providing a specific 3-byte input sequence a tab, a vertical tab, and a newline (\x09\x0b\n)—an unauthenticated attacker can trigger an infinite recursion loop during parsing. This leads to unbounded memory allocation, causing the host Node.js application to crash via Memory Exhaustion (OOM). This vulnerability is fixed in 18.0.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor markedjs
Product marked
Versions
  • Version >= 18.0.0, < 18.0.2 is affected

References

Problem Types

  • CWE-400: Uncontrolled Resource Consumption CWE
  • CWE-674: Uncontrolled Recursion CWE
  • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') CWE