Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @fastify/static
  4. ›
  5. CVE-2026-6410

CVE-2026-6410: @fastify/static vulnerable to path traversal in directory listing

April 16, 2026

@fastify/static v9.1.0 and earlier serves directory listings outside the configured static root when the list option is enabled. A request such as /public/../outside/ causes dirList.path() to resolve a directory outside the root via path.join() without a containment check.

A remote unauthenticated attacker can obtain directory listings for arbitrary directories accessible to the Node.js process, disclosing directory names and filenames that should not be exposed. File contents are not disclosed.

References

  • cna.openjsf.org/security-advisories.html
  • github.com/advisories/GHSA-pr96-94w5-mx2h
  • github.com/fastify/fastify-static
  • github.com/fastify/fastify-static/security/advisories/GHSA-pr96-94w5-mx2h
  • nvd.nist.gov/vuln/detail/CVE-2026-6410

Code Behaviors & Features

Detect and mitigate CVE-2026-6410 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 8.0.0 before 9.1.1

Fixed versions

  • 9.1.1

Solution

Upgrade to version 9.1.1 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

npm/@fastify/static/CVE-2026-6410.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 18 Apr 2026 12:20:14 +0000.