We found results for “”
CVE-2025-69211
Good to know:
Date: December 29, 2025
Nest is a framework for building scalable Node.js server-side applications. Versions prior to 11.1.11 have a Fastify URL encoding middleware bypass. A NestJS application is vulnerable if it uses "@nestjs/platform-fastify"; relies on "NestMiddleware" (via "MiddlewareConsumer") for security checks (authentication, authorization, etc.), or through "app.use()"; and applies middleware to specific routes using string paths or controllers (e.g., ".forRoutes('admin')"). Exploitation can result in unauthenticated users accessing protected routes, restricted administrative endpoints becoming accessible to lower-privileged users, and/or middleware performing sanitization or validation being skipped. This issue is patched in "@nestjs/platform-fastify@11.1.11".
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-367Top Fix
Upgrade Version
Upgrade to version @nestjs/platform-fastify - 11.1.11;@nestjs/platform-fastify - 11.1.11;https://github.com/nestjs/nest.git - v11.1.11
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


