{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T05:23:43.661","vulnerabilities":[{"cve":{"id":"CVE-2026-3419","sourceIdentifier":"ce714d77-add3-4f53-aff5-83d477b104bb","published":"2026-03-06T18:16:22.213","lastModified":"2026-03-18T19:11:46.967","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Fastify incorrectly accepts malformed `Content-Type` headers containing trailing characters after the subtype token, in violation of RFC 9110 §8.3.1(https://httpwg.org/specs/rfc9110.html#field.content-type). For example, a request sent with Content-Type: application/json garbage passes validation and is processed normally, rather than being rejected with 415 Unsupported Media Type.\n\nWhen regex-based content-type parsers are in use (a documented Fastify feature), the malformed value is matched against registered parsers using the full string including the trailing garbage. This means a request with an invalid content-type may be routed to and processed by a parser it should never have reached.\n\nImpact:\nAn attacker can send requests with RFC-invalid Content-Type headers that bypass validity checks, reach content-type parser matching, and be processed by the server. Requests that should be rejected at the validation stage are instead handled as if the content-type were valid.\n\nWorkarounds:\nDeploy a WAF rule to protect against this\n\nFix:\n\nThe fix is available starting with v5.8.1."},{"lang":"es","value":"Fastify acepta incorrectamente encabezados `Content-Type` malformados que contienen caracteres adicionales después del token de subtipo, en violación de la RFC 9110 §8.3.1(https://httpwg.org/specs/rfc9110.html#field.content-type). Por ejemplo, una solicitud enviada con Content-Type: application/json garbage pasa la validación y se procesa normalmente, en lugar de ser rechazada con 415 Unsupported Media Type.\n\nCuando se utilizan analizadores de tipo de contenido basados en expresiones regulares (regex) (una característica documentada de Fastify), el valor malformado se compara con los analizadores registrados utilizando la cadena completa, incluidos los caracteres adicionales. Esto significa que una solicitud con un tipo de contenido no válido puede ser enrutada y procesada por un analizador al que nunca debería haber llegado.\n\nImpacto:\nUn atacante puede enviar solicitudes con encabezados Content-Type no válidos según la RFC que eluden las comprobaciones de validez, llegan a la coincidencia del analizador de tipo de contenido y son procesadas por el servidor. Las solicitudes que deberían ser rechazadas en la etapa de validación son, en cambio, manejadas como si el tipo de contenido fuera válido.\n\nSoluciones provisionales:\nImplementar una regla de WAF para protegerse contra esto\n\nSolución:\n\nLa solución está disponible a partir de la v5.8.1."}],"metrics":{"cvssMetricV31":[{"source":"ce714d77-add3-4f53-aff5-83d477b104bb","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"ce714d77-add3-4f53-aff5-83d477b104bb","type":"Secondary","description":[{"lang":"en","value":"CWE-185"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fastify:fastify:*:*:*:*:*:node.js:*:*","versionStartIncluding":"5.7.2","versionEndExcluding":"5.8.1","matchCriteriaId":"9CAD5359-5175-4ED4-934C-F40C1C0C2EE8"}]}]}],"references":[{"url":"https://cna.openjsf.org/security-advisories.html","source":"ce714d77-add3-4f53-aff5-83d477b104bb","tags":["Vendor Advisory"]},{"url":"https://github.com/advisories/GHSA-573f-x89g-hqp9","source":"ce714d77-add3-4f53-aff5-83d477b104bb","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/fastify/fastify/commit/67f6c9b32cb3623d3c9470cc17ed830dd2f083d7","source":"ce714d77-add3-4f53-aff5-83d477b104bb","tags":["Patch"]},{"url":"https://github.com/fastify/fastify/security/advisories/GHSA-573f-x89g-hqp9","source":"ce714d77-add3-4f53-aff5-83d477b104bb","tags":["Vendor Advisory"]},{"url":"https://httpwg.org/specs/rfc9110.html#field.content-type","source":"ce714d77-add3-4f53-aff5-83d477b104bb","tags":["Technical Description"]},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-3419","source":"ce714d77-add3-4f53-aff5-83d477b104bb","tags":["VDB Entry"]}]}}]}