CVE-2026-6321

fast-uri · fast-uri

A vulnerability in the fast-uri library causes improper normalization of percent-encoded path separators and dot segments.

Executive summary

A high-severity vulnerability in the fast-uri library could allow for security bypasses via improper URI normalization.

Vulnerability

The fast-uri library improperly handles percent-encoded path separators and dot segments during normalization. This can allow attackers to bypass security filters by obfuscating path traversal or other malicious inputs.

Business impact

The CVSS score of 7.5 represents a High-severity risk. Since URI normalization is a common security function in web frameworks and proxies, this flaw could lead to authorization bypasses, allowing attackers to access restricted resources.

Remediation

Immediate Action: Update the fast-uri library to the latest version where normalization logic has been corrected.

Proactive Monitoring: Review web application logs for suspicious URI patterns that attempt to use encoded segments for directory traversal.

Compensating Controls: Ensure that web application security layers perform secondary validation of URIs and do not rely solely on the fast-uri library for canonicalization.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Library vulnerabilities are often overlooked but can have widespread impact. Organizations should identify if their applications include the fast-uri library and prioritize updating it to prevent potential path traversal and security bypass attacks.