CVE-2026-33806
- EPSS 0.04%
- Veröffentlicht 15.04.2026 00:14:02
- Zuletzt bearbeitet 17.04.2026 15:49:28
Impact: Fastify applications using schema.body.content for per-content-type body validation can have validation bypassed entirely by prepending a space to the Content-Type header. The body is still parsed correctly but schema validation is skipped. ...
CVE-2026-3635
- EPSS 0.01%
- Veröffentlicht 23.03.2026 13:53:00
- Zuletzt bearbeitet 16.04.2026 17:46:58
Summary When trustProxy is configured with a restrictive trust function (e.g., a specific IP like trustProxy: '10.0.0.1', a subnet, a hop count, or a custom function), the request.protocol and request.host getters read X-Forwarded-Proto and X-Forward...
CVE-2026-3419
- EPSS 0.02%
- Veröffentlicht 06.03.2026 17:50:58
- Zuletzt bearbeitet 18.03.2026 19:11:46
Fastify incorrectly accepts malformed `Content-Type` headers containing trailing characters after the subtype token, in violation of RFC 9110 §8.3.1(https://httpwg.org/specs/rfc9110.html#field.content-type). For example, a request sent with Content-T...
CVE-2026-25223
- EPSS 0.02%
- Veröffentlicht 03.02.2026 21:21:40
- Zuletzt bearbeitet 10.02.2026 20:05:15
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a ...
CVE-2026-25224
- EPSS 0.02%
- Veröffentlicht 03.02.2026 21:21:35
- Zuletzt bearbeitet 10.02.2026 19:24:48
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.3, a denial-of-service vulnerability in Fastify’s Web Streams response handling can allow a remote client to exhaust server memory. Applications that return a Readabl...
CVE-2025-32442
- EPSS 0.49%
- Veröffentlicht 18.04.2025 16:15:23
- Zuletzt bearbeitet 22.08.2025 21:15:31
Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0 as well as version 4.29.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by prov...
CVE-2022-41919
- EPSS 0.17%
- Veröffentlicht 22.11.2022 20:15:11
- Zuletzt bearbeitet 21.11.2024 07:24:04
Fastify is a web framework with minimal overhead and plugin architecture. The attacker can use the incorrect `Content-Type` to bypass the `Pre-Flight` checking of `fetch`. `fetch()` requests with Content-Type’s essence as "application/x-www-form-urle...
CVE-2022-39288
- EPSS 6.29%
- Veröffentlicht 10.10.2022 21:15:11
- Zuletzt bearbeitet 21.11.2024 07:17:57
fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the applic...
CVE-2020-8192
- EPSS 0.38%
- Veröffentlicht 30.07.2020 13:15:11
- Zuletzt bearbeitet 21.11.2024 05:38:28
A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.
CVE-2018-3711
- EPSS 0.33%
- Veröffentlicht 07.06.2018 02:29:07
- Zuletzt bearbeitet 21.11.2024 04:05:55
Fastify node module before 0.38.0 is vulnerable to a denial-of-service attack by sending a request with "Content-Type: application/json" and a very large payload.