CVE-2026-25223 PUBLISHED

Fastify's Content-Type header tab character allows body validation bypass

Assigner: GitHub_M
Reserved: 30.01.2026 Published: 03.02.2026 Updated: 04.02.2026

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a tab character (\t) followed by arbitrary content to the Content-Type header, attackers can bypass body validation while the server still processes the body as the original content type. This issue has been patched in version 5.7.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS Score: 7.5

Product Status

Vendor fastify
Product fastify
Versions
  • Version < 5.7.2 is affected

References

Problem Types

  • CWE-436: Interpretation Conflict CWE