Fastify incorrectly accepts malformed `Content-Type` headers containing trailing characters after the subtype token, in violation of RFC 9110 §8.3.1(https://httpwg.org/specs/rfc9110.html#field.content-type). For example, a request sent with Content-Type: application/json garbage passes validation and is processed normally, rather than being rejected with 415 Unsupported Media Type.
When regex-based content-type parsers are in use (a documented Fastify feature), the malformed value is matched against registered parsers using the full string including the trailing garbage. This means a request with an invalid content-type may be routed to and processed by a parser it should never have reached.
Impact:
An attacker can send requests with RFC-invalid Content-Type headers that bypass validity checks, reach content-type parser matching, and be processed by the server. Requests that should be rejected at the validation stage are instead handled as if the content-type were valid.
Workarounds:
Deploy a WAF rule to protect against this
Fix:
The fix is available starting with v5.8.1.
References
| Link | Resource |
|---|---|
| https://cna.openjsf.org/security-advisories.html | Vendor Advisory |
| https://github.com/advisories/GHSA-573f-x89g-hqp9 | Patch Vendor Advisory |
| https://github.com/fastify/fastify/commit/67f6c9b32cb3623d3c9470cc17ed830dd2f083d7 | Patch |
| https://github.com/fastify/fastify/security/advisories/GHSA-573f-x89g-hqp9 | Vendor Advisory |
| https://httpwg.org/specs/rfc9110.html#field.content-type | Technical Description |
| https://www.cve.org/CVERecord?id=CVE-2026-3419 | VDB Entry |
Configurations
History
18 Mar 2026, 19:11
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fastify fastify
Fastify |
|
| CPE | cpe:2.3:a:fastify:fastify:*:*:*:*:*:node.js:*:* | |
| Summary |
|
|
| References | () https://cna.openjsf.org/security-advisories.html - Vendor Advisory | |
| References | () https://github.com/advisories/GHSA-573f-x89g-hqp9 - Patch, Vendor Advisory | |
| References | () https://github.com/fastify/fastify/commit/67f6c9b32cb3623d3c9470cc17ed830dd2f083d7 - Patch | |
| References | () https://github.com/fastify/fastify/security/advisories/GHSA-573f-x89g-hqp9 - Vendor Advisory | |
| References | () https://httpwg.org/specs/rfc9110.html#field.content-type - Technical Description | |
| References | () https://www.cve.org/CVERecord?id=CVE-2026-3419 - VDB Entry |
06 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 18:16
Updated : 2026-03-18 19:11
NVD link : CVE-2026-3419
Mitre link : CVE-2026-3419
CVE.ORG link : CVE-2026-3419
JSON object : View
Products Affected
fastify
- fastify
CWE
CWE-185
Incorrect Regular Expression
