Fastify

Fastify

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 15.04.2026 00:14:02
  • Zuletzt bearbeitet 17.04.2026 15:49:28

Impact: Fastify applications using schema.body.content for per-content-type body validation can have validation bypassed entirely by prepending a space to the Content-Type header. The body is still parsed correctly but schema validation is skipped. ...

  • EPSS 0.01%
  • Veröffentlicht 23.03.2026 13:53:00
  • Zuletzt bearbeitet 16.04.2026 17:46:58

Summary When trustProxy is configured with a restrictive trust function (e.g., a specific IP like trustProxy: '10.0.0.1', a subnet, a hop count, or a custom function), the request.protocol and request.host getters read X-Forwarded-Proto and X-Forward...

  • EPSS 0.02%
  • Veröffentlicht 06.03.2026 17:50:58
  • Zuletzt bearbeitet 18.03.2026 19:11:46

Fastify incorrectly accepts malformed `Content-Type` headers containing trailing characters after the subtype token, in violation of RFC 9110 §8.3.1(https://httpwg.org/specs/rfc9110.html#field.content-type). For example, a request sent with Content-T...

  • EPSS 0.02%
  • Veröffentlicht 03.02.2026 21:21:40
  • Zuletzt bearbeitet 10.02.2026 20:05:15

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a ...

  • EPSS 0.02%
  • Veröffentlicht 03.02.2026 21:21:35
  • Zuletzt bearbeitet 10.02.2026 19:24:48

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.3, a denial-of-service vulnerability in Fastify’s Web Streams response handling can allow a remote client to exhaust server memory. Applications that return a Readabl...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 18.04.2025 16:15:23
  • Zuletzt bearbeitet 22.08.2025 21:15:31

Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0 as well as version 4.29.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by prov...

  • EPSS 0.17%
  • Veröffentlicht 22.11.2022 20:15:11
  • Zuletzt bearbeitet 21.11.2024 07:24:04

Fastify is a web framework with minimal overhead and plugin architecture. The attacker can use the incorrect `Content-Type` to bypass the `Pre-Flight` checking of `fetch`. `fetch()` requests with Content-Type’s essence as "application/x-www-form-urle...

  • EPSS 6.29%
  • Veröffentlicht 10.10.2022 21:15:11
  • Zuletzt bearbeitet 21.11.2024 07:17:57

fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the applic...

Exploit
  • EPSS 0.38%
  • Veröffentlicht 30.07.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:38:28

A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.

Exploit
  • EPSS 0.33%
  • Veröffentlicht 07.06.2018 02:29:07
  • Zuletzt bearbeitet 21.11.2024 04:05:55

Fastify node module before 0.38.0 is vulnerable to a denial-of-service attack by sending a request with "Content-Type: application/json" and a very large payload.