Description

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the matched substring. The filter only charges `memoryLimit` for the input string length, not the amplified output. An attacker can achieve exponential memory amplification (up to 625,000:1) while staying within the `memoryLimit` budget, leading to denial of service. Version 10.25.1 patches the issue.

INFO

Published Date :

2026-03-26T00:33:20.024Z

Last Modified :

2026-03-26T15:02:26.164Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33287 vulnerability.

Vendors Products
Harttle
  • Liquidjs
Liquidjs
  • Liquidjs
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33287.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact