๐Ÿ” CVE Alert

CVE-2026-33807

CRITICAL 9.1

@fastify/express vulnerable to middleware path doubling causing authentication bypass in child plugin scopes

CVSS Score
9.1
EPSS Score
0.1%
EPSS Percentile
16th

@fastify/express v4.0.4 and earlier contains a path handling bug in the onRegister function that causes middleware paths to be doubled when inherited by child plugins. When a child plugin is registered with a prefix that matches a middleware path, the middleware path is prefixed a second time, causing it to never match incoming requests. This results in complete bypass of Express middleware security controls, including authentication, authorization, and rate limiting, for all routes defined within affected child plugin scopes. No special configuration or request crafting is required. Upgrade to @fastify/express v4.0.5 or later.

CWE CWE-436
Vendor fastify
Product @fastify/express
Published Apr 15, 2026
Last Updated Apr 15, 2026
Stay Ahead of the Next One

Get instant alerts for fastify @fastify/express

Be the first to know when new critical vulnerabilities affecting fastify @fastify/express are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

fastify / @fastify/express
0 < 4.0.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/fastify/fastify-express/security/advisories/GHSA-hrwm-hgmj-7p9c cna.openjsf.org: https://cna.openjsf.org/security-advisories.html

Credits

๐Ÿ” FredKSchott mcollina UlisesGascon climba03003