fix: resolve CVE-2026-6322 in fast-uri#2510
Conversation
Upgrade fast-uri to satisfy >=3.1.2 Advisory: GHSA-v39h-62p7-jpjc Co-authored-by: Claude <noreply@anthropic.com> Signed-off-by: Florent Benoit <fbenoit@redhat.com>
|
Warning Rate limit exceeded
You’ve run out of usage credits. Purchase more in the billing tab. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: ⛔ Files ignored due to path filters (1)
📒 Files selected for processing (1)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
What does this PR do?
Fix high severity vulnerability CVE-2026-6322 in
fast-uri.Advisory: fast-uri vulnerable to host confusion via percent-encoded authority delimiters
Vulnerable versions: <=3.1.1
Patched versions: >=3.1.2
Advisory URL: GHSA-v39h-62p7-jpjc
Screenshot / video of UI
N/A - dependency update only.
What issues does this PR fix or reference?
Fixes CVE-2026-6322: fast-uri vulnerable to host confusion via percent-encoded authority delimiters
How to test this PR?
Run
pnpm auditand verify CVE-2026-6322 is no longer reported