CVE-2026-6321 PUBLISHED

fast-uri vulnerable to path traversal via percent-encoded dot segments

Assigner: openjs
Reserved: 14.04.2026 Published: 04.05.2026 Updated: 04.05.2026

fast-uri decoded percent-encoded path separators and dot segments before applying dot-segment removal in its normalize() and equal() functions. Encoded path data was treated like real slashes and parent-directory references, so distinct URIs could collapse onto the same normalized path. Applications that normalize or compare attacker-controlled URLs to enforce path-based policy can be bypassed, with a path that appears confined under an allowed prefix normalizing to a different location. Versions <= 3.1.0 are affected. Update to 3.1.1 or later.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS Score: 7.5

Product Status

Vendor fast-uri
Product fast-uri
Versions Default: unaffected
  • affected from 0 to 3.1.1 (excl.)
  • Version 3.1.1 is unaffected

Credits

  • Jvr reporter
  • Matteo Collina remediation developer
  • Ulises Gascón remediation reviewer
  • KaKa remediation reviewer

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE