A proxy route rule like:
routeRules: {
"/api/orders/**": { proxy: { to: "http://upstream/orders/**" } }
}
is intended to limit the proxy to URLs under /api/orders/. Before the patch, an attacker could bypass that scope by sending percent-encoded path traversal (..%2f) in the URL, causing Nitro to forward a request that the upstream resolved outside the configured scope. Example exploit:
GET /api/orders/..%2fadmin%2fconfig.json
Nitro sees ..%2f as opaque characters at match time, the /api/orders/** rule matched, and the raw path was forwarded to the upstream as /orders/..%2fadmin/config.json. An upstream that decodes %2F to / then resolved .. and can serve /admin/config.json outside the intended scope.
Users may be affected if ALL of the following are true:
routeRules with a proxy entry ({ proxy: { to: "..." } }).to value uses a /** wildcard suffix to forward sub-paths.%2F as / before routing or filesystem lookup.Whether the bypass actually leaks data depends on the upstream. Modern JS frameworks keep %2F opaque per RFC 3986 and are safe by construction.
%2F opaque per RFC 3986.os.path-based routing, anything sitting behind another layer that decodes %2F (common in microservice meshes).Any HTTP path reachable from the Nitro server to the upstream could be requested, regardless of the configured /** scope. In typical deployments (API gateway, BFF, microservice proxy) this could expose internal admin endpoints, secrets endpoints, or other services the developer believed the scope rule fenced off.
Upgrade to one of:
The fix canonicalizes the incoming pathname before building the upstream URL and rejects requests with 400 Bad Request if the resolved path would escape the rule's base. The bytes forwarded upstream are unchanged when the request is allowed.
Note: the fix assumes the upstream does not double-decode percent-encoding. If your upstream decodes twice (
%252F → %2F → /), it remains your responsibility to harden it. Single-decode is standard.
Reported by @mHe4am (@he4am on HackerOne) via the Vercel Open Source program.
{
"github_reviewed": true,
"github_reviewed_at": "2026-05-06T23:01:27Z",
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"nvd_published_at": null
}