CVE-2026-3419

Published: Mar 06, 2026 Last Modified: Mar 09, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,3
Source: ce714d77-add3-4f53-aff5-83d477b104bb
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none

Description

AI Translation Available

Fastify incorrectly accepts malformed `Content-Type` headers containing trailing characters after the subtype token, in violation of RFC 9110 §8.3.1(https://httpwg.org/specs/rfc9110.html#field.content-type). For example, a request sent with Content-Type: application/json garbage passes validation and is processed normally, rather than being rejected with 415 Unsupported Media Type.

When regex-based content-type parsers are in use (a documented Fastify feature), the malformed value is matched against registered parsers using the full string including the trailing garbage. This means a request with an invalid content-type may be routed to and processed by a parser it should never have reached.

Impact:
An attacker can send requests with RFC-invalid Content-Type headers that bypass validity checks, reach content-type parser matching, and be processed by the server. Requests that should be rejected at the validation stage are instead handled as if the content-type were valid.

Workarounds:
Deploy a WAF rule to protect against this

Fix:

The fix is available starting with v5.8.1.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0003
Percentile
0,1th
Updated

EPSS Score Trend (Last 9 Days)

185

Incorrect Regular Expression

Draft
Common Consequences
Security Scopes Affected:
Other Access Control
Potential Impacts:
Unexpected State Varies By Context Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
View CWE Details
https://cna.openjsf.org/security-advisories.html
https://github.com/advisories/GHSA-573f-x89g-hqp9
https://github.com/fastify/fastify/commit/67f6c9b32cb3623d3c9470cc17ed830dd2f08…
https://github.com/fastify/fastify/security/advisories/GHSA-573f-x89g-hqp9
https://httpwg.org/specs/rfc9110.html#field.content-type
https://www.cve.org/CVERecord?id=CVE-2026-3419