Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @fastify/reply-from
  4. ›
  5. CVE-2026-33805

CVE-2026-33805: Fastify's connection header abuse enables stripping of proxy-added headers

April 16, 2026

@fastify/reply-from and @fastify/http-proxy process the client’s Connection header after the proxy has added its own headers via rewriteRequestHeaders. This allows attackers to retroactively strip proxy-added headers (like access control or identification headers) from upstream requests by listing them in the Connection header value. This affects applications using these plugins with custom header injection for routing, access control, or security purposes.

References

  • cna.openjsf.org/security-advisories.html
  • github.com/advisories/GHSA-gwhp-pf74-vj37
  • github.com/fastify/fastify-reply-from
  • github.com/fastify/fastify-reply-from/security/advisories/GHSA-gwhp-pf74-vj37
  • nvd.nist.gov/vuln/detail/CVE-2026-33805

Code Behaviors & Features

Detect and mitigate CVE-2026-33805 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 12.6.2

Fixed versions

  • 12.6.2

Solution

Upgrade to version 12.6.2 or above.

Impact 9.3 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax

Source file

npm/@fastify/reply-from/CVE-2026-33805.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 17 Apr 2026 00:19:00 +0000.