Fastify Malformed Content-Type Header Vulnerability - Fastify
CVE-2026-3419
5.3MEDIUM
What is CVE-2026-3419?
Fastify has a vulnerability where it incorrectly processes malformed Content-Type headers with trailing characters, violating RFC standards. This flaw allows attackers to send requests containing invalid Content-Type headers that bypass intended validity checks. Consequently, such requests can reach content-type parsers, which may incorrectly treat them as valid, potentially leading to unintended processing by the server. Users are advised to implement web application firewall (WAF) rules as a protective measure and update to Fastify version 5.8.1 or later to mitigate this issue.
Affected Version(s)
fastify 5.7.2 < 5.8.1
fastify 5.8.1
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Saad FELLAHI
James Sumners
Matteo Collina
Ulises GascĂłn
