We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32442

Fastify vulnerable to invalid content-type parsing, which could lead to validation bypass



Description

Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0 as well as version 4.9.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by providing a _slightly altered_ content type such as with different casing or altered whitespacing before `;`. This was patched in v5.3.1, but the initial patch did not cover all problems. This has been fully patched in v5.3.2 and v4.9.1. A workaround involves not specifying individual content types in the schema.

Reserved 2025-04-08 | Published 2025-04-18 | Updated 2025-04-28 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-1287: Improper Validation of Specified Type of Input

Product status

>= 5.0.0, < 5.3.2
affected

= 4.9.0
affected

References

github.com/...astify/security/advisories/GHSA-mg2h-6x62-wpwc

github.com/...ommit/436da4c06dfbbb8c24adee3a64de0c51e4f47418

github.com/...ommit/f3d2bcb3963cd570a582e5d39aab01a9ae692fe4

hackerone.com/reports/3087928

cve.org (CVE-2025-32442)

nvd.nist.gov (CVE-2025-32442)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32442

Support options

Helpdesk Chat, Email, Knowledgebase