CVE-2026-33808 PUBLISHED

@fastify/express vulnerable to middleware authentication bypass via URL normalization gaps (duplicate slashes and semicolons)

Assigner: openjs
Reserved: 23.03.2026 Published: 15.04.2026 Updated: 15.04.2026

Impact@fastify/express v4.0.4 and earlier fails to normalize URLs before passing them to Express middleware when Fastify router normalization options are enabled. This allows complete bypass of path-scoped authentication middleware via duplicate slashes when ignoreDuplicateSlashes is enabled, or via semicolon delimiters when useSemicolonDelimiter is enabled. In both cases, Fastify router normalizes the URL and matches the route, but @fastify/express passes the original un-normalized URL to Express middleware, which fails to match and is skipped. An unauthenticated attacker can access protected routes by manipulating the URL path.

PatchesUpgrade to @fastify/express v4.0.5 or later.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.1

Product Status

Vendor fastify
Product @fastify/express
Versions Default: unaffected
  • affected from 0 to 4.0.5 (excl.)
  • Version 4.0.5 is unaffected

Credits

  • FredKSchott reporter
  • mcollina remediation developer
  • UlisesGascon remediation reviewer
  • climba03003 remediation reviewer

References

Problem Types

  • CWE-436: Interpretation Conflict CWE