๐Ÿ” CVE Alert

CVE-2025-64166

MEDIUM 5.4

Mercurius: Incorrect Content-Type parsing can lead to CSRF attack

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

Mercurius is a GraphQL adapter for Fastify. Prior to version 16.4.0, a cross-site request forgery (CSRF) vulnerability was identified. The issue arises from incorrect parsing of the Content-Type header in requests. Specifically, requests with Content-Type values such as application/x-www-form-urlencoded, multipart/form-data, or text/plain could be misinterpreted as application/json. This misinterpretation bypasses the preflight checks performed by the fetch() API, potentially allowing unauthorized actions to be performed on behalf of an authenticated user. This issue has been patched in version 16.4.0.

CWE CWE-352
Vendor mercurius-js
Product mercurius
Published Mar 5, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for mercurius-js mercurius

Be the first to know when new medium vulnerabilities affecting mercurius-js mercurius are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

mercurius-js / mercurius
< 16.4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/mercurius-js/mercurius/security/advisories/GHSA-v66j-6wwf-jc57 github.com: https://github.com/mercurius-js/mercurius/pull/1187 github.com: https://github.com/mercurius-js/mercurius/commit/962d402ec7a92342f4a1b7f5f04af01776838c3c