Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

fastify — Vulnerabilities & Security Advisories 28

Browse all 28 CVE security advisories affecting fastify. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Fastify is a high-performance web framework for Node.js, primarily designed to facilitate the rapid development of backend APIs and microservices. Its architecture emphasizes low overhead and high throughput, making it a popular choice for scalable server-side applications. Security audits reveal a history of twenty-eight recorded Common Vulnerabilities and Exposures (CVEs), predominantly involving prototype pollution, denial-of-service conditions, and improper input validation. These flaws often stem from complex middleware interactions or inadequate sanitization of user-supplied data, potentially leading to remote code execution or privilege escalation in misconfigured environments. While the framework itself enforces strict schema validation by default, vulnerabilities frequently arise from developer oversight in plugin integration or dependency management. Major incidents have highlighted risks related to unhandled exceptions and insecure default configurations, necessitating rigorous code reviews and timely patching to maintain application integrity in production deployments.

Found 1 results / 28Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2021-29624 Lack of protection against cookie tossing attacks in fastify-csrf — fastify-csrfCWE-565 6.5 Medium2021-05-19

This page lists every published CVE security advisory associated with fastify. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.