[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-6270":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-16T20:13:34.037Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":31,"aliases":32,"duplicate_of":9,"upstream":33,"downstream":34,"duplicates":35,"related":36,"reserved_at":9,"published_at":37,"modified_at":38,"state":39,"summary":40,"references_raw":47,"kevs":61,"epss":9,"epss_history":62,"metrics":63,"affected":71},"CVE-2026-6270","@fastify/middie versions 9.3.1 and earlier do not register inherited middleware directly on child plugin engine instances. When a Fastify application registers authentication middleware in a parent scope and then registers child plugins with @fastify/middie, the child scope does not inherit the parent middleware. This allows unauthenticated requests to reach routes defined in child plugin scopes, bypassing authentication and authorization checks. Upgrade to @fastify/middie 9.3.2 to fix this issue. There are no workarounds.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-436","Interpretation Conflict","Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.","weakness","Incomplete","Class",[19,23,27],{"id":20,"name":21,"techniques":22},"CAPEC-105","HTTP Request Splitting",[],{"id":24,"name":25,"techniques":26},"CAPEC-273","HTTP Response Smuggling",[],{"id":28,"name":29,"techniques":30},"CAPEC-34","HTTP Response Splitting",[],[],[],[],[],[],[],"2026-04-16T13:44:46.322Z","2026-04-16T14:24:26.764Z","Received",{"cisa_kev":41,"cisa_ransomware":41,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":42,"severity_score":43,"severity_version":44,"severity_source":45,"severity_vector":46,"severity_status":39},false,"critical",9.1,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",[48,53,57],{"url":49,"sources":50,"tags":52},"https://github.com/fastify/fastify-express/security/advisories/GHSA-hrwm-hgmj-7p9c",[45,51],"nvd",[],{"url":54,"sources":55,"tags":56},"https://github.com/fastify/middie/security/advisories/GHSA-72c6-fx6q-fr5w",[45,51],[],{"url":58,"sources":59,"tags":60},"https://cna.openjsf.org/security-advisories.html",[45,51],[],[],[],[64,69],{"source":45,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":65,"cvss_v4_0":9},{"baseScore":43,"baseSeverity":66,"vectorString":46,"impactScore":67,"exploitabilityScore":68},"CRITICAL",8.7,10,{"source":51,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":70,"cvss_v4_0":9},{"baseScore":43,"baseSeverity":66,"vectorString":46,"impactScore":67,"exploitabilityScore":68},[72],{"ecosystem":9,"name":73,"vendor":73,"product":73,"cpe_part":74,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":75},"@fastify/middie","a",[76],{"version":77,"is_range":78,"range_type":45,"version_start":9,"version_start_type":9,"version_end":79,"version_end_type":80,"fixed_in":9},"\u003C 9.3.2",true,"9.3.2","excluding"]