#VU125978 Incorrect Regular Expression in Fastify - CVE-2026-3419
Published: April 14, 2026
Fastify
fastify.io
Description
The vulnerability allows a remote attacker to bypass content-type validation and submit malformed requests that are processed by the server.
The vulnerability exists due to incorrect regular expression in subtypeNameReg when validating Content-Type headers containing trailing characters after the subtype token. A remote attacker can send a specially crafted request with a malformed Content-Type header to bypass content-type validation and submit malformed requests that are processed by the server.
When regex-based content-type parsers are in use, the malformed header value may be matched against registered parsers using the full string including the trailing garbage.