Description
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the matched substring. The filter only charges `memoryLimit` for the input string length, not the amplified output. An attacker can achieve exponential memory amplification (up to 625,000:1) while staying within the `memoryLimit` budget, leading to denial of service. Version 10.25.1 patches the issue.
INFO
Published Date :
2026-03-26T00:33:20.024Z
Last Modified :
2026-03-26T15:02:26.164Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33287 vulnerability.
| Vendors | Products |
|---|---|
| Harttle |
|
| Liquidjs |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33287.