CVE-2026-6410

@fastify/static versions 8.0.0 through 9.1.0 allow path traversal when directory listing is enabled via the list option. The dirList.path() function resolves directories outside the configured static root using path.join() without a containment check. A remote unauthenticated attacker can obtain directory listings for arbitrary directories accessible to the Node.js process, disclosing directory and file names. File contents are not disclosed. Upgrade to @fastify/static 9.1.1 to fix this issue. As a workaround, disable directory listing by removing the list option from the plugin configuration.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fastify:fastify-static:*:*:*:*:*:*:*:*

History

23 Apr 2026, 19:31

Type Values Removed Values Added
First Time Fastify fastify-static
Fastify
References () https://cna.openjsf.org/security-advisories.html - () https://cna.openjsf.org/security-advisories.html - Third Party Advisory
References () https://github.com/fastify/fastify-static/security/advisories/GHSA-pr96-94w5-mx2h - () https://github.com/fastify/fastify-static/security/advisories/GHSA-pr96-94w5-mx2h - Mitigation, Vendor Advisory
CPE cpe:2.3:a:fastify:fastify-static:*:*:*:*:*:*:*:*

16 Apr 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-16 14:16

Updated : 2026-04-23 19:31


NVD link : CVE-2026-6410

Mitre link : CVE-2026-6410

CVE.ORG link : CVE-2026-6410


JSON object : View

Products Affected

fastify

  • fastify-static
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')