CVE-2026-25223

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a tab character (\t) followed by arbitrary content to the Content-Type header, attackers can bypass body validation while the server still processes the body as the original content type. This issue has been patched in version 5.7.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fastify:fastify:*:*:*:*:*:node.js:*:*

History

10 Feb 2026, 20:05

Type Values Removed Values Added
CPE cpe:2.3:a:fastify:fastify:*:*:*:*:*:node.js:*:*
First Time Fastify fastify
Fastify
References () https://fastify.dev/docs/latest/Reference/Validation-and-Serialization - () https://fastify.dev/docs/latest/Reference/Validation-and-Serialization - Product, Technical Description
References () https://github.com/fastify/fastify/blob/759e9787b5669abf953068e42a17bffba7521348/lib/content-type-parser.js#L125 - () https://github.com/fastify/fastify/blob/759e9787b5669abf953068e42a17bffba7521348/lib/content-type-parser.js#L125 - Product
References () https://github.com/fastify/fastify/blob/759e9787b5669abf953068e42a17bffba7521348/lib/validation.js#L272 - () https://github.com/fastify/fastify/blob/759e9787b5669abf953068e42a17bffba7521348/lib/validation.js#L272 - Product
References () https://github.com/fastify/fastify/commit/32d7b6add39ddf082d92579a58bea7018c5ac821 - () https://github.com/fastify/fastify/commit/32d7b6add39ddf082d92579a58bea7018c5ac821 - Patch
References () https://github.com/fastify/fastify/security/advisories/GHSA-jx2c-rxcm-jvmq - () https://github.com/fastify/fastify/security/advisories/GHSA-jx2c-rxcm-jvmq - Vendor Advisory, Mitigation
References () https://hackerone.com/reports/3464114 - () https://hackerone.com/reports/3464114 - Permissions Required

03 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 22:16

Updated : 2026-02-10 20:05


NVD link : CVE-2026-25223

Mitre link : CVE-2026-25223

CVE.ORG link : CVE-2026-25223


JSON object : View

Products Affected

fastify

  • fastify
CWE
CWE-436

Interpretation Conflict