{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T16:34:40.358","vulnerabilities":[{"cve":{"id":"CVE-2025-32442","sourceIdentifier":"security-advisories@github.com","published":"2025-04-18T16:15:23.327","lastModified":"2025-08-22T21:15:31.630","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0 as well as version 4.29.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by providing a _slightly altered_ content type such as with different casing or altered whitespacing before `;`. This was patched in v5.3.1, but the initial patch did not cover all problems. This has been fully patched in v5.3.2 and v4.29.1. A workaround involves not specifying individual content types in the schema."},{"lang":"es","value":"Fastify es un framework web rápido y de bajo consumo para Node.js. En las versiones 5.0.0 a 5.3.0, las aplicaciones que especifican diferentes estrategias de validación para distintos tipos de contenido pueden omitir la validación proporcionando un tipo de contenido ligeramente modificado, como con mayúsculas y minúsculas diferentes o con espacios antes de `;` modificados. Esto se solucionó en la versión 5.3.1, pero la corrección inicial no solucionó todos los problemas. Se ha corregido completamente en la versión 5.3.2. Un workaround consiste en no especificar tipos de contenido individuales en el esquema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fastify:fastify:*:*:*:*:*:node.js:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.3.2","matchCriteriaId":"8C3A81A7-33F6-491A-992C-FBD944597D42"},{"vulnerable":true,"criteria":"cpe:2.3:a:fastify:fastify:4.29.0:*:*:*:*:node.js:*:*","matchCriteriaId":"10266904-B1D6-47CF-8F45-18FB744FC761"}]}]}],"references":[{"url":"https://github.com/fastify/fastify/commit/436da4c06dfbbb8c24adee3a64de0c51e4f47418","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/fastify/fastify/commit/f3d2bcb3963cd570a582e5d39aab01a9ae692fe4","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/fastify/fastify/security/advisories/GHSA-mg2h-6x62-wpwc","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://hackerone.com/reports/3087928","source":"security-advisories@github.com","tags":["Permissions Required"]}]}}]}