A vulnerability in @fastify/middie versions < 9.2.0 can result in authentication/authorization bypass when using path-scoped middleware (for example, app.use('/secret', auth)).
When Fastify router normalization options are enabled (such as ignoreDuplicateSlashes, useSemicolonDelimiter, and related trailing-slash behavior), crafted request paths may bypass middleware checks while still being routed to protected handlers.
References
| Link | Resource |
|---|---|
| https://github.com/fastify/middie/security/advisories/GHSA-8p85-9qpw-fwgw | Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-27 19:16
Updated : 2026-03-19 17:30
NVD link : CVE-2026-2880
Mitre link : CVE-2026-2880
CVE.ORG link : CVE-2026-2880
JSON object : View
Products Affected
openjsf
- \@fastify\/middie
CWE
CWE-20
Improper Input Validation
