Fastify web framework is vulnerable to a CSRF attack due to incorrect `Content-Type`. Version 4.10.2 and 3.29.4 contain patches. Learn how to mitigate the vulnerability.
Fastify, a web framework known for its minimal overhead and plugin architecture, is susceptible to a Cross-Site Request Forgery (CSRF) attack due to an issue with incorrect
Content-Type
. Attackers can exploit this vulnerability to bypass Pre-Flight
checking of fetch
requests, potentially leading to a CSRF attack. The issue has been addressed in version 4.10.2 and 3.29.4. To mitigate, implement Cross-Site Request Forgery protection using @fastify/csrf
.