Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66415: CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') in fastify fastify-reply-from

0
Medium
VulnerabilityCVE-2025-66415cvecve-2025-66415cwe-441
Published: Mon Dec 01 2025 (12/01/2025, 22:39:32 UTC)
Source: CVE Database V5
Vendor/Project: fastify
Product: fastify-reply-from

Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

AI-Powered Analysis

AILast updated: 12/08/2025, 23:16:15 UTC

Technical Analysis

CVE-2025-66415 identifies a vulnerability in the fastify-reply-from plugin, a component used within the Fastify Node.js framework to forward HTTP requests to other servers. The vulnerability is classified as CWE-441, an unintended proxy or intermediary ('confused deputy') issue. In versions prior to 12.5.0, the plugin fails to properly restrict which routes can be forwarded. By crafting a malicious URL, an attacker can exploit this flaw to access backend routes that should be off-limits, effectively bypassing route-based access controls. This occurs because the plugin forwards requests based on the URL without sufficient validation, allowing unauthorized access to internal services or sensitive endpoints. The vulnerability has a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality and integrity. No known exploits have been reported in the wild as of the publication date. The issue is resolved in fastify-reply-from version 12.5.0, which implements stricter route validation and forwarding controls to prevent unauthorized access. Organizations using Fastify with this plugin should audit their versions and upgrade promptly to avoid exploitation.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to internal or sensitive backend routes, potentially exposing confidential data or allowing attackers to interact with internal services not intended for public access. This could undermine the confidentiality and integrity of data processed by web applications using fastify-reply-from. The vulnerability does not require authentication or user interaction, increasing the risk of automated exploitation. While availability impact is minimal, unauthorized access could facilitate further attacks or data leakage. Organizations in sectors with high reliance on web services—such as finance, healthcare, and government—may face increased risk due to the sensitive nature of their data and services. Additionally, the widespread use of Node.js and Fastify in European startups and enterprises means a broad attack surface. Failure to patch could also lead to reputational damage and regulatory penalties under GDPR if personal data is exposed.

Mitigation Recommendations

The primary mitigation is to upgrade fastify-reply-from to version 12.5.0 or later, where the vulnerability is fixed. Organizations should audit their codebases and dependencies to identify any usage of vulnerable versions. Beyond upgrading, developers should implement strict validation and whitelisting of URLs and routes that can be forwarded by the plugin to prevent unauthorized access. Employing Web Application Firewalls (WAFs) with rules to detect and block suspicious URL patterns targeting proxy endpoints can provide additional defense. Regular security testing, including penetration testing focused on proxy and forwarding mechanisms, can help detect misconfigurations. Monitoring logs for unusual access patterns to internal routes can aid in early detection of exploitation attempts. Finally, adopting a defense-in-depth approach by segmenting internal services and enforcing least privilege access reduces the impact of any potential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.366Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692e1c816dbd3477d752f020

Added to database: 12/1/2025, 10:53:53 PM

Last enriched: 12/8/2025, 11:16:15 PM

Last updated: 1/15/2026, 11:32:42 PM

Views: 296

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats