Spoofing Vulnerability in Fastify Framework by Fastify Team
CVE-2026-3635

6.1MEDIUM

Key Information:

Vendor

Fastify

Status
Vendor
CVE Published:
23 March 2026

What is CVE-2026-3635?

A vulnerability exists in the Fastify framework where the trustProxy configuration can be manipulated. When configured restrictively (e.g., specific IP restrictions), the request.protocol and request.host getters may expose the application to spoofing attacks. Attackers can bypass proxies and directly connect to the application, allowing them to craft requests with forged protocol and host values. This could compromise security mechanisms that depend on these values for critical decisions such as HTTPS enforcement and CSRF protection. It is crucial for users of affected versions to review their trustProxy settings and implement necessary mitigations.

Affected Version(s)

fastify 0 <= 5.8.2

fastify 5.8.3

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

LetaoZhao (TinkAnet)
KaKa (climba03003)
Matteo Collina
Ulises GascĂłn
.