Open Redirect Affecting nitropack package, versions <2.13.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-NITROPACK-16757946
  • published19 May 2026
  • disclosed6 May 2026
  • credit0x0OZ

Introduced: 6 May 2026

NewCVE-2026-44372  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade nitropack to version 2.13.4 or higher.

Overview

nitropack is a Build and Deploy Universal JavaScript Servers

Affected versions of this package are vulnerable to Open Redirect via the routeRules function. An attacker can redirect users to arbitrary external sites by crafting URLs with double slashes after the route prefix, causing browsers to interpret the redirect as a protocol-relative URL. This is only exploitable if the project uses routeRules with a redirect entry that includes a wildcard suffix (such as /**), and the redirect is not handled natively at the CDN layer (e.g., not using the vercel, netlify, cloudflare-pages, or edgeone presets).

CVSS Base Scores

version 4.0
version 3.1