Back to list

Nautobot: Object bulk rename UI actions vulnerable to denial of service by crafted regular expression (REDoS) — CVE-2026-44796

GitHub · GitHub · CVE-2026-44796

ID
CVE-2026-44796
Date
Activity
Source
GitHub
Vendor
GitHub
Threat
medium
CVSS
6.5

Summary

### Impact Nautobot UI object-bulk-rename endpoints (for example, `/dcim/interfaces/rename/`) were vulnerable to application-wide denial of service via maliciously crafted regular expressions in the `find` field in combination with the `use_regex` flag. ### Patches A general-purpose timeout has been added to these endpoints in Nautobot v2.4.33 and v3.1.2, which ensures that the request will fail early with an…

Product

pip: nautobot

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories