Description
This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter
References (2)
Core 2
Core References
Third Party Advisory x_refsource_misc
https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044
Third Party Advisory x_refsource_misc
https://github.com/fastify/fastify-csrf/pull/26
Scores
CVSS v3
5.9
EPSS
0.0031
EPSS Percentile
53.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
Details
CWE
CWE-200
CWE-732
Status
published
Products (2)
fastify/fastify-csrf
< 3.0.0
npm/fastify-csrf
0 - 3.0.0npm
Published
Jan 19, 2021
Tracked Since
Feb 18, 2026