Description

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a tab character (\t) followed by arbitrary content to the Content-Type header, attackers can bypass body validation while the server still processes the body as the original content type. This issue has been patched in version 5.7.2.

INFO

Published Date :

2026-02-03T21:21:40.268Z

Last Modified :

2026-02-04T21:18:16.693Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-25223 vulnerability.

Vendors Products
Fastify
  • Fastify

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact