Description
@fastify/middie is the plugin that adds middleware support on steroids to Fastify. A security vulnerability exists in @fastify/middie prior to version 9.1.0 where middleware registered with a specific path prefix can be bypassed using URL-encoded characters (e.g., `/%61dmin` instead of `/admin`). While the middleware engine fails to match the encoded path and skips execution, the underlying Fastify router correctly decodes the path and matches the route handler, allowing attackers to access protected endpoints without the middleware constraints. Version 9.1.0 fixes the issue.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/fastify/middie/security/advisories/GHSA-cxrg-g7r8-w69p
Issue Tracking x_refsource_misc
https://github.com/fastify/middie/pull/245
Patch x_refsource_misc
https://github.com/fastify/middie/commit/d44cd56eb724490babf7b452fdbbdd37ea2effba
Release Notes x_refsource_misc
https://github.com/fastify/middie/releases/tag/v9.1.0
Scores
CVSS v3
8.4
EPSS
0.0011
EPSS Percentile
29.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-177
Status
published
Products (2)
fastify/middie
0 - 9.1.0npm
openjsf/\@fastify\/middie
< 9.1.0
Published
Jan 19, 2026
Tracked Since
Feb 18, 2026