CVE-2026-44928
Uriparser URI Comparison Flaw Before 1.0.2
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| uriparser | uriparser | to 1.0.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-670 | The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability exists in the uriparser library before version 1.0.2, specifically in the EqualsUri function. The function can incorrectly determine that two different URIs are equal due to a bug in how it compares the absolute path component of URIs.
How can this vulnerability impact me? :
The impact of this vulnerability is that applications relying on uriparser's EqualsUri function may mistakenly treat two distinct URIs as identical. This could lead to incorrect behavior in URI validation, access control, caching, or routing logic, potentially causing security or functional issues.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update uriparser to version 1.0.2 or later, where the bug in the EqualsUri function has been fixed.
The fix addresses the incorrect handling of the .absolutePath in URI comparison logic, preventing misclassification of unequal URIs as equal.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific information provided about detection methods or commands to identify this vulnerability on a network or system.