chore(deps): update dependency @fastify/middie to v9.3.2 [security]#439
Merged
renovate[bot] merged 1 commit intomainfrom Apr 17, 2026
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
9.2.0→9.3.2GitHub Vulnerability Alerts
CVE-2026-33804
Impact
@fastify/middiev9.3.1 and earlier does not read the deprecated (but still functional) top-levelignoreDuplicateSlashesoption, only reading fromrouterOptions. This creates a normalization gap: Fastify's router normalizes duplicate slashes but middie does not, allowing middleware bypass via URLs with duplicate leading slashes (e.g.,//admin/secret).This only affects applications using the deprecated top-level configuration style (
fastify({ ignoreDuplicateSlashes: true })). Applications usingrouterOptions: { ignoreDuplicateSlashes: true }are not affected.This is distinct from GHSA-8p85-9qpw-fwgw (CVE-2026-2880), which was patched in v9.2.0.
Patches
Upgrade to
@fastify/middie>= 9.3.2.Workarounds
Migrate from deprecated top-level
ignoreDuplicateSlashes: truetorouterOptions: { ignoreDuplicateSlashes: true }.Severity
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NCVE-2026-6270
Impact
@fastify/middiev9.3.1 and earlier incorrectly re-prefixes middleware paths when propagating them to child plugin scopes. When a child plugin is registered with a prefix that overlaps with a parent-scoped middleware path, the middleware path is modified during inheritance and silently fails to match incoming requests.This results in complete bypass of middleware security controls for all routes defined within affected child plugin scopes, including nested (grandchild) scopes. Authentication, authorization, rate limiting, and any other middleware-based security mechanisms are skipped. No special request crafting or configuration is required.
This is the same vulnerability class as GHSA-hrwm-hgmj-7p9c (CVE-2026-33807) in
@fastify/express.Patches
Upgrade to
@fastify/middiev9.3.2 or later.Workarounds
None. Upgrade to the patched version.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NRelease Notes
fastify/middie (@fastify/middie)
v9.3.2Compare Source
This fixes CVE CVE-2026-6270 GHSA-72c6-fx6q-fr5w.
This fixes CVE CVE-2026-33804 GHSA-v9ww-2j6r-98q6.
What's Changed
Full Changelog: fastify/middie@v9.3.1...v9.3.2
v9.3.1Compare Source
What's Changed
Full Changelog: fastify/middie@v9.3.0...v9.3.1
v9.3.0Compare Source
What's Changed
New Contributors
Full Changelog: fastify/middie@v9.2.0...v9.3.0
Configuration
📅 Schedule: (in timezone Asia/Shanghai)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.