CVE-2026-3419

5.3 MEDIUM
Published: March 06, 2026 Modified: March 18, 2026
View on NVD

Description

Fastify incorrectly accepts malformed `Content-Type` headers containing trailing characters after the subtype token, in violation of RFC 9110 ยง8.3.1(https://httpwg.org/specs/rfc9110.html#field.content-type). For example, a request sent with Content-Type: application/json garbage passes validation and is processed normally, rather than being rejected with 415 Unsupported Media Type. When regex-based content-type parsers are in use (a documented Fastify feature), the malformed value is matched against registered parsers using the full string including the trailing garbage. This means a request with an invalid content-type may be routed to and processed by a parser it should never have reached. Impact: An attacker can send requests with RFC-invalid Content-Type headers that bypass validity checks, reach content-type parser matching, and be processed by the server. Requests that should be rejected at the validation stage are instead handled as if the content-type were valid. Workarounds: Deploy a WAF rule to protect against this Fix: The fix is available starting with v5.8.1.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://cna.openjsf.org/security-advisories.html
Source: ce714d77-add3-4f53-aff5-83d477b104bb
Vendor Advisory
https://github.com/advisories/GHSA-573f-x89g-hqp9
Source: ce714d77-add3-4f53-aff5-83d477b104bb
Patch Vendor Advisory
https://github.com/fastify/fastify/security/advisories/GHSA-573f-x89g-hqp9
Source: ce714d77-add3-4f53-aff5-83d477b104bb
Vendor Advisory
https://httpwg.org/specs/rfc9110.html#field.content-type
Source: ce714d77-add3-4f53-aff5-83d477b104bb
Technical Description
https://www.cve.org/CVERecord?id=CVE-2026-3419
Source: ce714d77-add3-4f53-aff5-83d477b104bb
VDB Entry

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.3 / 10.0
EPSS (Exploit Probability)
0.0%
14th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fastify