CVE-2026-6321 POC (Proof-of-Concept)

CVE-2026-6321 POC (Proof-of-Concept)

fast-uri decoded percent-encoded path separators and dot segments before applying dot-segment removal in its normalize() and equal() functions. Encoded path data was treated like real slashes and parent-directory references, so distinct URIs could collapse onto the same normalized path. Applications that normalize or compare attacker-controlled URLs to enforce path-based policy can be bypassed, with a path that appears confined under an allowed prefix normalizing to a different location. Versions <= 3.1.0 are affected. Update to 3.1.1 or later.

Published: 2026-05-04

CVSS: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Download CVE-2026-6321 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-117-cve-2026-22165/

https://hokyo.gr/poc-291-cve-2026-42229/

https://hokyo.gr/poc-105-cve-2026-43044/

Copyright 2017- 2025 Hokyo JapanEats ©