Cyber Posture

CVE-2026-6322

High

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0003 8.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

fast-uri normalize() decoded percent-encoded authority delimiters inside the host component and then re-emitted them as raw delimiters during serialization. A host that combined an allowed domain, an encoded at-sign, and a different domain was re-emitted with the at-sign as a…

more

raw userinfo separator, changing the URI's authority to the second domain. Applications that normalize untrusted URLs before host allowlist checks, redirect validation, or outbound request routing can be steered to a different authority than the input appeared to specify. Versions <= 3.1.1 are affected. Update to 3.1.2 or later.

Security SummaryAI

CVE-2026-6322 is a vulnerability in the fast-uri JavaScript library's normalize() function, which incorrectly decodes percent-encoded authority delimiters within the host component and re-emits them as raw delimiters during serialization. This affects versions of fast-uri up to and including 3.1.1. Specifically, a maliciously crafted host combining an allowed domain, an encoded at-sign (@), and a different domain results in the normalized URI re-emitting the at-sign as a raw userinfo separator, effectively altering the URI's authority to the second domain. The issue is classified under CWE-436 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Attackers can exploit this vulnerability remotely without authentication by supplying untrusted URLs to applications that invoke fast-uri's normalize() prior to performing host allowlist checks, redirect validation, or outbound request routing. Successful exploitation steers the application to a different authority than intended, potentially enabling open redirects, SSRF, or unintended network requests to attacker-controlled hosts.

Advisories from the OpenJS Foundation CNA and the fast-uri GitHub security advisory (GHSA-v39h-62p7-jpjc) recommend updating to fast-uri version 3.1.2 or later, where the normalization logic has been corrected to prevent decoding and re-emission of these delimiters in the host component.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

CVE enables remote exploitation of public-facing apps (via malicious URL input to normalize() before allowlist/redirect/routing checks) for SSRF, open redirects and outbound connections to attacker hosts, directly mapping to T1190 for initial access and T1105 for resulting ingress of attacker-controlled content.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References