<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33804 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33804/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 15:17:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33804/feed.xml" rel="self" type="application/rss+xml"/><item><title>@fastify/middie Middleware Bypass Vulnerability (CVE-2026-33804)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fastify-middie-bypass/</link><pubDate>Thu, 16 Apr 2026 15:17:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fastify-middie-bypass/</guid><description>A middleware bypass vulnerability (CVE-2026-33804) exists in @fastify/middie versions 9.3.1 and earlier when the deprecated Fastify ignoreDuplicateSlashes option is enabled, potentially allowing unauthorized access.</description><content:encoded><![CDATA[<p>@fastify/middie, a Fastify middleware engine, is vulnerable to a significant security bypass. Specifically, versions 9.3.1 and earlier are susceptible when the deprecated Fastify <code>ignoreDuplicateSlashes</code> option is enabled. This vulnerability, identified as CVE-2026-33804, arises because the middleware&rsquo;s path matching logic fails to account for the duplicate slash normalization performed by Fastify&rsquo;s router. Consequently, crafted HTTP requests containing duplicate slashes can circumvent middleware authentication and authorization checks, potentially granting unauthorized access to protected resources. This vulnerability only affects applications that are actively using the deprecated <code>ignoreDuplicateSlashes</code> option. The recommended remediation is to upgrade to @fastify/middie version 9.3.2, which addresses this issue. Alternatively, disabling the <code>ignoreDuplicateSlashes</code> option can serve as a mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Fastify application using @fastify/middie version 9.3.1 or earlier with the <code>ignoreDuplicateSlashes</code> option enabled.</li>
<li>The attacker crafts a malicious HTTP request targeting a protected resource. The request URI includes duplicate slashes (e.g., <code>/api//resource</code>).</li>
<li>The request is received by the Fastify server.</li>
<li>Fastify&rsquo;s router normalizes the duplicate slashes in the URI before passing it to the middleware.</li>
<li>The middleware&rsquo;s path matching logic fails to correctly handle the normalized URI due to the <code>ignoreDuplicateSlashes</code> setting.</li>
<li>As a result, the request bypasses the intended authentication and/or authorization checks implemented by the middleware.</li>
<li>The request reaches the targeted resource, which is processed by the application.</li>
<li>The attacker gains unauthorized access to the resource, potentially leading to data breaches, privilege escalation, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass authentication and authorization controls, potentially gaining unauthorized access to sensitive data or functionality within the Fastify application. The severity of the impact depends on the nature of the protected resources and the extent of the attacker&rsquo;s access. This could lead to data breaches, privilege escalation, or other malicious activities. The number of potential victims is dependent on the number of applications using the vulnerable version of @fastify/middie with the <code>ignoreDuplicateSlashes</code> option enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade @fastify/middie to version 9.3.2 or later to patch the vulnerability described in CVE-2026-33804.</li>
<li>Disable the <code>ignoreDuplicateSlashes</code> option in Fastify configurations as an alternative mitigation.</li>
<li>Deploy the Sigma rule <code>DetectFastifyMiddieBypassAttempt</code> to identify potential exploitation attempts based on duplicate slashes in the request URI.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fastify</category><category>middie</category><category>middleware</category><category>bypass</category><category>cve-2026-33804</category><category>defense-evasion</category></item></channel></rss>