CVE-2026-6270

Fastify · @fastify/middie

The @fastify/middie package fails to inherit middleware in child plugin scopes, leading to an authentication bypass for unauthenticated requests.

Executive summary

A critical authentication bypass in @fastify/middie allows unauthenticated requests to reach protected routes in child plugin scopes.

Vulnerability

The vulnerability stems from the improper registration of inherited middleware when dealing with child plugin engine instances. This logic error allows requests to bypass configured authentication checks, effectively rendering security controls on child routes ineffective.

Business impact

This flaw carries a CVSS score of 9.1, indicating a high risk of unauthorized access to sensitive application data and administrative functions. The bypass of authentication mechanisms may lead to unauthorized data exposure and potential manipulation of application states.

Remediation

Immediate Action: Update @fastify/middie to version 9.3.2 or later.

Proactive Monitoring: Monitor server-side access logs for unexpected traffic patterns reaching child plugin routes that should otherwise be restricted.

Compensating Controls: Implement global authentication middleware as a temporary measure if immediate patching is not possible.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

Security teams must prioritize this update to ensure that all plugin scopes correctly enforce authentication. There are no known workarounds, making the software update the only viable path to remediation.