Affected versions of this package are vulnerable to Infinite loop through the expand function when processing a brace pattern with a zero step value. An attacker can cause the process to hang and exhaust system memory by supplying specially crafted input, such as {1..2..0}. This can lead to significant resource consumption and denial of service.
Workaround
This vulnerability can be mitigated by sanitizing strings passed to expand to ensure a step value of 0 is not used.
Remediation
Upgrade brace-expansion to version 5.0.5 or higher.