LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-6270 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: April 17, 2026

@fastify/middie - Broken Access Control

Published: April 16, 2026Updated: April 17, 2026Remote Exploitable

Overview

@fastify/middie <= 9.3.1 contains a broken access control vulnerability caused by failure to register inherited middleware on child plugin instances, letting unauthenticated requests bypass authentication in child scopes, exploit requires use of child plugins.

Severity & Score

Severity: Critical
CVSS Score: 9.1
EPSS Score: 2.6%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can bypass authentication and authorization checks in child plugin routes, potentially accessing protected resources.

Mitigation

Upgrade to @fastify/middie 9.3.2 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 16, 2026

šŸ”“ CVE-2026-6270 - Critical (9.1) @fastify/middie versions 9.3.1 and earlier do not register inherited middleware directly on child plugin engine instances. When a Fastify application registers authentication middleware in a parent scope and then registers child plugins with @FAST... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-6270/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-6270
Severity
Critical
CVSS Score
9.1
Type
broken_access_control
Status
unconfirmed
EPSS
2.6%
Social Posts
1

CWE

  • CWE-436

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS Score

2.6%Probability of exploitation in the next 30 days