GROWI ReDoS Vulnerability (CVE-2026-41040) Poses High DoS Risk
The National Vulnerability Database has disclosed CVE-2026-41040, a high-severity regular expression denial of service (ReDoS) vulnerability affecting GROWI, a wiki platform provided by GROWI, Inc. Rated with a CVSS score of 7.5, this flaw allows an unauthenticated attacker to trigger a denial-of-service condition by supplying a specially crafted input string.
ReDoS vulnerabilities are insidious because they exploit the computational complexity of certain regular expressions when processing malicious input. A seemingly innocuous string can force the regex engine into an exponentially long processing loop, consuming all available CPU resources and rendering the application unresponsive. For GROWI, this means an attacker could effectively take the wiki offline with minimal effort.
This isn’t just a nuisance; it’s a direct operational impact. Any organization relying on GROWI for critical documentation, collaboration, or knowledge management faces a tangible risk of service disruption. Defenders need to understand that the attacker’s calculus here is simple: maximum impact with low effort. Patching this is non-negotiable.
What This Means For You
- If your organization uses GROWI, you need to identify all instances and prepare for patching immediately when a fix is released. Monitor your GROWI deployments for unusual CPU spikes or service interruptions that could indicate an active ReDoS attack, even before a patch is available. This vulnerability allows for a complete denial-of-service with no authentication required, making it a critical threat to availability.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
GROWI ReDoS Exploit Attempt - CVE-2026-41040
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41040 | DoS | GROWI |
| CVE-2026-41040 | DoS | regular expression denial of service (ReDoS) |
| CVE-2026-41040 | DoS | crafted input string |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 23, 2026 at 10:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.