Executive Summary

Informations
Name CVE-2025-32442 First vendor Publication 2025-04-18
Vendor Cve Last vendor Modification 2025-06-24

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0 as well as version 4.9.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by providing a _slightly altered_ content type such as with different casing or altered whitespacing before `;`. This was patched in v5.3.1, but the initial patch did not cover all problems. This has been fully patched in v5.3.2 and v4.9.1. A workaround involves not specifying individual content types in the schema.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32442

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4

Sources (Detail)

https://github.com/fastify/fastify/commit/436da4c06dfbbb8c24adee3a64de0c51e4f...
https://github.com/fastify/fastify/commit/f3d2bcb3963cd570a582e5d39aab01a9ae6...
https://github.com/fastify/fastify/security/advisories/GHSA-mg2h-6x62-wpwc
https://hackerone.com/reports/3087928
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-06-25 05:20:43
  • Multiple Updates
2025-05-27 02:57:11
  • First insertion