Home

Description

Fastify incorrectly accepts malformed `Content-Type` headers containing trailing characters after the subtype token, in violation of RFC 9110 §8.3.1(https://httpwg.org/specs/rfc9110.html#field.content-type). For example, a request sent with Content-Type: application/json garbage passes validation and is processed normally, rather than being rejected with 415 Unsupported Media Type. When regex-based content-type parsers are in use (a documented Fastify feature), the malformed value is matched against registered parsers using the full string including the trailing garbage. This means a request with an invalid content-type may be routed to and processed by a parser it should never have reached. Impact: An attacker can send requests with RFC-invalid Content-Type headers that bypass validity checks, reach content-type parser matching, and be processed by the server. Requests that should be rejected at the validation stage are instead handled as if the content-type were valid. Workarounds: Deploy a WAF rule to protect against this Fix: The fix is available starting with v5.8.1.

PUBLISHED Reserved 2026-03-01 | Published 2026-03-06 | Updated 2026-03-06 | Assigner openjs




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-185: Incorrect Regular Expression

Product status

Default status
unaffected

5.7.2 (semver) before 5.8.1
affected

5.8.1 (semver)
unaffected

Credits

Saad FELLAHI reporter

James Sumners remediation developer

Matteo Collina coordinator

Ulises Gascón remediation reviewer

References

github.com/...astify/security/advisories/GHSA-573f-x89g-hqp9

github.com/...ommit/67f6c9b32cb3623d3c9470cc17ed830dd2f083d7

httpwg.org/specs/rfc9110.html

github.com/advisories/GHSA-573f-x89g-hqp9

cna.openjsf.org/security-advisories.html

www.cve.org/CVERecord?id=CVE-2026-3419

cve.org (CVE-2026-3419)

nvd.nist.gov (CVE-2026-3419)

Download JSON