Fastify Malformed Content-Type Header Vulnerability - Fastify
CVE-2026-3419

5.3MEDIUM

Key Information:

Vendor

Fastify

Status
Vendor
CVE Published:
6 March 2026

What is CVE-2026-3419?

Fastify has a vulnerability where it incorrectly processes malformed Content-Type headers with trailing characters, violating RFC standards. This flaw allows attackers to send requests containing invalid Content-Type headers that bypass intended validity checks. Consequently, such requests can reach content-type parsers, which may incorrectly treat them as valid, potentially leading to unintended processing by the server. Users are advised to implement web application firewall (WAF) rules as a protective measure and update to Fastify version 5.8.1 or later to mitigate this issue.

Affected Version(s)

fastify 5.7.2 < 5.8.1

fastify 5.8.1

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Saad FELLAHI
James Sumners
Matteo Collina
Ulises GascĂłn
.