Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q3j6-qgpj-74h6 | fast-uri vulnerable to path traversal via percent-encoded dot segments |
Tue, 12 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openjsf
Openjsf fast-uri |
|
| CPEs | cpe:2.3:a:openjsf:fast-uri:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openjsf
Openjsf fast-uri |
Wed, 06 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fast-uri
Fast-uri fast-uri |
|
| Vendors & Products |
Fast-uri
Fast-uri fast-uri |
Tue, 05 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | fast-uri decoded percent-encoded path separators and dot segments before applying dot-segment removal in its normalize() and equal() functions. Encoded path data was treated like real slashes and parent-directory references, so distinct URIs could collapse onto the same normalized path. Applications that normalize or compare attacker-controlled URLs to enforce path-based policy can be bypassed, with a path that appears confined under an allowed prefix normalizing to a different location. Versions <= 3.1.0 are affected. Update to 3.1.1 or later. | |
| Title | fast-uri vulnerable to path traversal via percent-encoded dot segments | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: openjs
Published:
Updated: 2026-05-05T12:44:34.743Z
Reserved: 2026-04-14T20:23:01.545Z
Link: CVE-2026-6321
Updated: 2026-05-05T12:44:31.262Z
Status : Analyzed
Published: 2026-05-04T20:16:20.950
Modified: 2026-05-12T18:54:46.870
Link: CVE-2026-6321
OpenCVE Enrichment
Updated: 2026-05-06T09:22:32Z
Github GHSA