Vulnerabilities/

LiquidJS: memoryLimit Bypass through Negative Range Values Leads to Process Crash

Severity:
High

Description

LiquidJS’s memoryLimit security mechanism can be completely bypassed by using reverse range expressions (e.g., (100000000..1)), allowing an attacker to allocate unlimited memory. Combined with a string flattening operation (e.g., replace filter), this causes a **V8 Fatal error that crashes the Node.

Recommendation

No fix is available yet. Followings are affected versions:

References

Related Issues

Tags:
npm
liquidjs
Anything's wrong? Let us know Last updated on March 25, 2026