Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cxrg-g7r8-w69p | Fastify Middie Middleware Path Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 20 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastify
Fastify fastify |
|
| Vendors & Products |
Fastify
Fastify fastify |
Mon, 19 Jan 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | @fastify/middie is the plugin that adds middleware support on steroids to Fastify. A security vulnerability exists in @fastify/middie prior to version 9.1.0 where middleware registered with a specific path prefix can be bypassed using URL-encoded characters (e.g., `/%61dmin` instead of `/admin`). While the middleware engine fails to match the encoded path and skips execution, the underlying Fastify router correctly decodes the path and matches the route handler, allowing attackers to access protected endpoints without the middleware constraints. Version 9.1.0 fixes the issue. | |
| Title | Fastify Middie Middleware Path Bypass | |
| Weaknesses | CWE-177 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-20T14:45:31.487Z
Reserved: 2026-01-05T22:30:38.718Z
Link: CVE-2026-22031
Updated: 2026-01-20T14:45:24.914Z
Status : Received
Published: 2026-01-19T16:15:54.310
Modified: 2026-01-19T16:15:54.310
Link: CVE-2026-22031
No data.
OpenCVE Enrichment
Updated: 2026-01-20T08:43:34Z
Github GHSA