CVE-2026-6414
MEDIUM
5,9
Source: ce714d77-add3-4f53-aff5-83d477b104bb
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
Description
AI Translation Available
@fastify/static versions 8.0.0 through 9.1.0 decode percent-encoded path separators (%2F) before filesystem resolution, while Fastify's router treats them as literal characters. This mismatch allows attackers to bypass route-based middleware or guards that protect files served by @fastify/static. For example, a route guard on a protected path can be circumvented by encoding the path separator in the URL. Upgrade to @fastify/static 9.1.1 to fix this issue. There are no workarounds.
177
Improper Handling of URL Encoding (Hex Encoding)
DraftCommon Consequences
Security Scopes Affected:
Integrity
Potential Impacts:
Unexpected State
Applicable Platforms
All platforms may be affected
https://cna.openjsf.org/security-advisories.html
https://github.com/fastify/fastify-static/security/advisories/GHSA-x428-ghpx-8j…
https://github.com/fastify/middie/security/advisories/GHSA-cxrg-g7r8-w69p
https://github.com/honojs/hono/security/advisories/GHSA-q5qw-h33p-qvwr