CVE-2026-6322

Fastify · fast-uri

The fast-uri library improperly handles percent-encoded authority delimiters during normalization, leading to potential injection or parsing errors during re-serialization.

Executive summary

An improper normalization vulnerability in the fast-uri library could allow for URI manipulation, posing a risk of security bypass or logical errors in downstream applications.

Vulnerability

The vulnerability exists in the normalize() function, where decoded percent-encoded authority delimiters are re-emitted as raw delimiters. This flaw can be exploited by an unauthenticated attacker to manipulate URI structure, potentially leading to unauthorized redirection or request smuggling.

Business impact

Assessed at a CVSS score of 7.5, this flaw represents a significant risk to application integrity. By manipulating how URIs are processed, an attacker could potentially bypass security filters or redirect traffic, leading to data exposure or unauthorized access to sensitive application components.

Remediation

Immediate Action: Update the fast-uri library to the latest version recommended by the maintainers to ensure proper URI sanitization.

Proactive Monitoring: Audit application logs for abnormal URI patterns or unexpected behavior in request routing and redirection modules.

Compensating Controls: Utilize a robust WAF to block requests that contain suspicious or malformed URI structures that deviate from expected application traffic norms.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability could be leveraged to bypass security controls in web applications. It is recommended that development teams update this dependency immediately to prevent potential URI-based injection attacks.