Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wf42-42fg-fg84 | Nest Fastify HEAD Request Middleware Bypass |
Mon, 23 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nestjs:nest:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nestjs
Nestjs nest |
|
| Vendors & Products |
Nestjs
Nestjs nest |
Fri, 20 Mar 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nest is a framework for building scalable Node.js server-side applications. In versions 11.1.15 and below, a NestJS application using @nestjs/platform-fastify GET middleware can be bypassed because Fastify automatically redirects HEAD requests to the corresponding GET handlers (if they exist). As a result: middleware will be completely skipped, the HTTP response won't include a body (since the response is truncated when redirecting a HEAD request to a GET handler), and the actual handler will still be executed. This issue is fixed in version 11.1.16. | |
| Title | Nest Fastify HEAD Request Middleware Bypass | |
| Weaknesses | CWE-670 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T15:48:23.564Z
Reserved: 2026-03-17T17:22:14.664Z
Link: CVE-2026-33011
Updated: 2026-03-20T15:48:18.888Z
Status : Analyzed
Published: 2026-03-20T05:16:15.043
Modified: 2026-03-23T19:26:31.710
Link: CVE-2026-33011
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:09:17Z
Github GHSA