Description
fast-uri decoded percent-encoded path separators and dot segments before applying dot-segment removal in its normalize() and equal() functions. Encoded path data was treated like real slashes and parent-directory references, so distinct URIs could collapse onto the same normalized path. Applications that normalize or compare attacker-controlled URLs to enforce path-based policy can be bypassed, with a path that appears confined under an allowed prefix normalizing to a different location. Versions <= 3.1.0 are affected. Update to 3.1.1 or later.
Published: 2026-05-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q3j6-qgpj-74h6 fast-uri vulnerable to path traversal via percent-encoded dot segments
History

Tue, 12 May 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Openjsf
Openjsf fast-uri
CPEs cpe:2.3:a:openjsf:fast-uri:*:*:*:*:*:node.js:*:*
Vendors & Products Openjsf
Openjsf fast-uri

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 06 May 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Fast-uri
Fast-uri fast-uri
Vendors & Products Fast-uri
Fast-uri fast-uri

Tue, 05 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description fast-uri decoded percent-encoded path separators and dot segments before applying dot-segment removal in its normalize() and equal() functions. Encoded path data was treated like real slashes and parent-directory references, so distinct URIs could collapse onto the same normalized path. Applications that normalize or compare attacker-controlled URLs to enforce path-based policy can be bypassed, with a path that appears confined under an allowed prefix normalizing to a different location. Versions <= 3.1.0 are affected. Update to 3.1.1 or later.
Title fast-uri vulnerable to path traversal via percent-encoded dot segments
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Fast-uri Fast-uri
Openjsf Fast-uri
cve-icon MITRE

Status: PUBLISHED

Assigner: openjs

Published:

Updated: 2026-05-05T12:44:34.743Z

Reserved: 2026-04-14T20:23:01.545Z

Link: CVE-2026-6321

cve-icon Vulnrichment

Updated: 2026-05-05T12:44:31.262Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-04T20:16:20.950

Modified: 2026-05-12T18:54:46.870

Link: CVE-2026-6321

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-04T19:31:57Z

Links: CVE-2026-6321 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T09:22:32Z

Weaknesses