pnpm Audit Flags Critical Dependencies: Two High-Severity ReDoS Vulnerabilities in Picomatch
A recent automated security audit of a pnpm-managed project has uncovered multiple unpatched vulnerabilities, including two high-severity flaws. The audit results, dated March 26, 2026, reveal a dependency chain at risk, with the most pressing threats stemming from the widely used `picomatch` library. These are not theoretical risks; they are active, documented security advisories (GHSA-c2c7-rcm5-vvqj) that expose projects to ReDoS (Regular Expression Denial of Service) attacks through maliciously crafted extglob patterns, which could crash or severely degrade application performance.
The core of the exposure lies in two specific packages. The `picomatch` library is flagged twice for high-severity ReDoS vulnerabilities, with patched fixes available in versions 2.3.2 and 4.0.4. Concurrently, the `yaml` parser carries a moderate-severity vulnerability (GHSA-48c2-rrv3-qjmp) related to stack overflow from deeply nested collections, patched in version 2.8.3. The audit output indicates the project's current dependencies are running older, vulnerable versions of these libraries, leaving the software supply chain open to exploitation.
For any development team or organization relying on this dependency stack, the immediate implication is operational and security pressure. Unaddressed, these vulnerabilities represent a clear attack vector that malicious actors could weaponize to disrupt services. The prescribed remediation is straightforward but urgent: upgrade `picomatch` to at least v4.0.4 and `yaml` to v2.8.3 or later. Failure to patch introduces tangible risk, as these libraries are common building blocks in the JavaScript/Node.js ecosystem, potentially affecting downstream applications and deployment stability.