Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p36q-q72m-gchr | srvx is vulnerable to middleware bypass via absolute URI in request line |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H3
H3 srvx |
|
| CPEs | cpe:2.3:a:h3:srvx:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
H3
H3 srvx |
Fri, 27 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H3js
H3js srvx |
|
| Vendors & Products |
H3js
H3js srvx |
Thu, 26 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | srvx is a universal server based on web standards. Prior to version 0.11.13, a pathname parsing discrepancy in srvx's `FastURL` allows middleware bypass on the Node.js adapter when a raw HTTP request uses an absolute URI with a non-standard scheme (e.g. `file://`). Starting in version 0.11.13, the `FastURL` constructor now deopts to native `URL` for any string not starting with `/`, ensuring consistent pathname resolution. | |
| Title | srvx is vulnerable to middleware bypass via absolute URI in request line | |
| Weaknesses | CWE-706 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T14:41:11.864Z
Reserved: 2026-03-23T17:34:57.560Z
Link: CVE-2026-33732
Updated: 2026-03-27T14:41:07.245Z
Status : Analyzed
Published: 2026-03-26T18:16:31.430
Modified: 2026-04-02T18:41:11.220
Link: CVE-2026-33732
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:38:57Z
Github GHSA