CVE-2026-6270 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: April 17, 2026
@fastify/middie - Broken Access Control
Overview
@fastify/middie <= 9.3.1 contains a broken access control vulnerability caused by failure to register inherited middleware on child plugin instances, letting unauthenticated requests bypass authentication in child scopes, exploit requires use of child plugins.
Severity & Score
Impact
Unauthenticated attackers can bypass authentication and authorization checks in child plugin routes, potentially accessing protected resources.
Mitigation
Upgrade to @fastify/middie 9.3.2 or later.
References
Social Media Activity(1 post)
š“ CVE-2026-6270 - Critical (9.1) @fastify/middie versions 9.3.1 and earlier do not register inherited middleware directly on child plugin engine instances. When a Fastify application registers authentication middleware in a parent scope and then registers child plugins with @FAST... š https://www.thehackerwire.com/vulnerability/CVE-2026-6270/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-6270
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- broken_access_control
- Status
- unconfirmed
- EPSS
- 2.6%
- Social Posts
- 1
CWE
- CWE-436
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N