Home

Description

A vulnerability in @fastify/middie versions < 9.2.0 can result in authentication/authorization bypass when using path-scoped middleware (for example, app.use('/secret', auth)). When Fastify router normalization options are enabled (such as ignoreDuplicateSlashes, useSemicolonDelimiter, and related trailing-slash behavior), crafted request paths may bypass middleware checks while still being routed to protected handlers.

PUBLISHED Reserved 2026-02-20 | Published 2026-02-27 | Updated 2026-02-27 | Assigner openjs




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-20

Product status

Default status
unaffected

0.0.0 (semver) before 9.2.0
affected

References

github.com/...middie/security/advisories/GHSA-8p85-9qpw-fwgw

cve.org (CVE-2026-2880)

nvd.nist.gov (CVE-2026-2880)

Download JSON