A vulnerability in @fastify/middie versions < 9.2.0 can result in authentication/authorization bypass when using path-scoped middleware (for example, app.use('/secret', auth)).
When Fastify router normalization options are enabled (such as ignoreDuplicateSlashes, useSemicolonDelimiter, and related trailing-slash behavior), crafted request paths may bypass middleware checks while still being routed to protected handlers.
References
| Link | Resource |
|---|---|
| https://github.com/fastify/middie/security/advisories/GHSA-8p85-9qpw-fwgw | Mitigation Vendor Advisory |
Configurations
History
19 Mar 2026, 17:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/fastify/middie/security/advisories/GHSA-8p85-9qpw-fwgw - Mitigation, Vendor Advisory | |
| CPE | cpe:2.3:a:openjsf:\@fastify\/middie:*:*:*:*:*:fastify:*:* | |
| First Time |
Openjsf \@fastify\/middie
Openjsf |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
02 Mar 2026, 20:30
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Feb 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 19:16
Updated : 2026-03-19 17:30
NVD link : CVE-2026-2880
Mitre link : CVE-2026-2880
CVE.ORG link : CVE-2026-2880
JSON object : View
Products Affected
openjsf
- \@fastify\/middie
CWE
CWE-20
Improper Input Validation
