Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-vg7c-pctm-m7gn
Vulnerability ID VCID-vg7c-pctm-m7gn
Aliases CVE-2021-33502
GHSA-px4h-xg32-q955
Summary ReDoS in normalize-url The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33502.json
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2021-33502
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-px4h-xg32-q955
cvssv3.1 7.5 https://github.com/sindresorhus/normalize-url
generic_textual HIGH https://github.com/sindresorhus/normalize-url
cvssv3.1 7.5 https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
generic_textual HIGH https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
cvssv3.1 7.5 https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
generic_textual HIGH https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-33502
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2021-33502
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20210706-0001
generic_textual HIGH https://security.netapp.com/advisory/ntap-20210706-0001
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33502.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/sindresorhus/normalize-url
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-33502
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.netapp.com/advisory/ntap-20210706-0001
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.57819
EPSS Score 0.00355
Published At April 13, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:02:20.198349+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-px4h-xg32-q955/GHSA-px4h-xg32-q955.json 38.0.0