Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jx2c-rxcm-jvmq | Fastify's Content-Type header tab character allows body validation bypass |
Tue, 10 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fastify:fastify:*:*:*:*:*:node.js:*:* |
Wed, 04 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastify
Fastify fastify |
|
| Weaknesses | CWE-179 | |
| Vendors & Products |
Fastify
Fastify fastify |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 03 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a tab character (\t) followed by arbitrary content to the Content-Type header, attackers can bypass body validation while the server still processes the body as the original content type. This issue has been patched in version 5.7.2. | |
| Title | Fastify's Content-Type header tab character allows body validation bypass | |
| Weaknesses | CWE-436 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-04T21:18:16.693Z
Reserved: 2026-01-30T14:44:47.327Z
Link: CVE-2026-25223
Updated: 2026-02-04T21:18:14.142Z
Status : Analyzed
Published: 2026-02-03T22:16:31.130
Modified: 2026-02-10T20:05:15.127
Link: CVE-2026-25223
OpenCVE Enrichment
Updated: 2026-04-18T00:15:31Z
Github GHSA