Back to list

Nitro has a proxy scope bypass via percent-encoded path traversal in `routeRules` — CVE-2026-44373

GHSA · GitHub · CVE-2026-44373

ID
CVE-2026-44373
Date
Updated
Activity
Source
GHSA
Vendor
GitHub
Threat
medium
CVSS
5.3

Summary

A proxy route rule like: ```ts routeRules: { "/api/orders/**": { proxy: { to: "http://upstream/orders/**" } } } ``` is intended to limit the proxy to URLs under `/api/orders/`. Before the patch, an attacker could bypass that scope by sending percent-encoded path traversal (`..%2f`) in the URL, causing Nitro to forward a request that the upstream resolved outside the configured scope. Example exploit: ``` GET…

Product

npm: nitro | npm: nitropack

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories