@fastify/middie versions 9.3.1 and earlier are vulnerable to middleware bypass when the deprecated Fastify ignoreDuplicateSlashes option is enabled. The middleware path matching logic does not account for duplicate slash normalization performed by Fastify's router, allowing requests with duplicate slashes to bypass middleware authentication and authorization checks. This only affects applications using the deprecated ignoreDuplicateSlashes option. Upgrade to @fastify/middie 9.3.2 to fix this issue. There are no workarounds other than disabling the ignoreDuplicateSlashes option.
References
| Link | Resource |
|---|---|
| https://cna.openjsf.org/security-advisories.html | Vendor Advisory |
| https://github.com/fastify/middie/security/advisories/GHSA-v9ww-2j6r-98q6 | Mitigation Vendor Advisory |
Configurations
History
22 Apr 2026, 17:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cna.openjsf.org/security-advisories.html - Vendor Advisory | |
| References | () https://github.com/fastify/middie/security/advisories/GHSA-v9ww-2j6r-98q6 - Mitigation, Vendor Advisory | |
| First Time |
Openjsf \@fastify\/middie
Openjsf |
|
| CPE | cpe:2.3:a:openjsf:\@fastify\/middie:*:*:*:*:*:fastify:*:* |
16 Apr 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-16 15:17
Updated : 2026-04-22 17:30
NVD link : CVE-2026-33804
Mitre link : CVE-2026-33804
CVE.ORG link : CVE-2026-33804
JSON object : View
Products Affected
openjsf
- \@fastify\/middie
CWE
CWE-436
Interpretation Conflict
