Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2022-0686
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-0686
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0686.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-0686
Aliases
GHSA-hgjh-723h-mx2j
Downstream
DEBIAN-CVE-2022-0686
DLA-3336-1
UBUNTU-CVE-2022-0686
USN-5973-1
Published
2022-02-20T13:15:07Z
Modified
2025-09-19T13:29:54.612220Z
Severity
9.1 (Critical)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS Calculator
Summary
[none]
Details
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.
References
https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5
https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c
https://security.netapp.com/advisory/ntap-20220325-0006/
https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html
Affected packages
Git
/
github.com/unshiftio/url-parse
Affected ranges
Type
GIT
Repo
https://github.com/unshiftio/url-parse
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
d5c64791ef496ca5459ae7f2176a31ea53b127e5
Affected versions
0.*
0.0.4
0.1
0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.1.5
0.2
0.2.1
0.2.2
0.2.3
1.*
1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.1.8
1.1.9
1.2.0
1.3.0
1.4.0
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.5.0
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
CVE-2022-0686 - OSV