Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-69211

Опубликовано: 29 дек. 2025
Источник: redhat
CVSS3: 7.4

Описание

Nest is a framework for building scalable Node.js server-side applications. Versions prior to 11.1.11 have a Fastify URL encoding middleware bypass. A NestJS application is vulnerable if it uses @nestjs/platform-fastify; relies on NestMiddleware (via MiddlewareConsumer) for security checks (authentication, authorization, etc.), or through app.use(); and applies middleware to specific routes using string paths or controllers (e.g., .forRoutes('admin')). Exploitation can result in unauthenticated users accessing protected routes, restricted administrative endpoints becoming accessible to lower-privileged users, and/or middleware performing sanitization or validation being skipped. This issue is patched in @nestjs/platform-fastify@11.1.11.

A flaw was found in the NestJS framework, specifically within the @nestjs/platform-fastify component. This vulnerability, a Fastify URL encoding middleware bypass, allows unauthenticated or lower-privileged users to circumvent security checks. By exploiting this flaw, attackers can gain unauthorized access to protected routes, including restricted administrative endpoints, or bypass critical sanitization and validation middleware. This can lead to sensitive information disclosure or further system compromise.

Отчет

This vulnerability is rated Important for Red Hat because it allows unauthorized access to protected routes in NestJS applications. In the Red Hat context, this impacts OpenShift Container Platform and Hosted OpenShift components that are configured to use @nestjs/platform-fastify and rely on NestMiddleware for security checks on specific routes.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshift4/ose-agent-installer-ui-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=2425826nestjs: NestJS framework: Security bypass allows unauthorized access to protected routes

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
3 месяца назад

Nest is a framework for building scalable Node.js server-side applications. Versions prior to 11.1.11 have a Fastify URL encoding middleware bypass. A NestJS application is vulnerable if it uses `@nestjs/platform-fastify`; relies on `NestMiddleware` (via `MiddlewareConsumer`) for security checks (authentication, authorization, etc.), or through `app.use()`; and applies middleware to specific routes using string paths or controllers (e.g., `.forRoutes('admin')`). Exploitation can result in unauthenticated users accessing protected routes, restricted administrative endpoints becoming accessible to lower-privileged users, and/or middleware performing sanitization or validation being skipped. This issue is patched in `@nestjs/platform-fastify@11.1.11`.

github
3 месяца назад

Nest has a Fastify URL Encoding Middleware Bypass (TOCTOU)

7.4 High

CVSS3