CVE-2026-33011: CWE-670: Always-Incorrect Control Flow Implementation in nestjs nest
CVE-2026-33011 is a high-severity vulnerability in NestJS versions 11. 1. 15 and below, specifically affecting applications using the @nestjs/platform-fastify GET middleware. Due to Fastify's automatic redirection of HEAD requests to GET handlers, middleware can be bypassed entirely, causing the middleware logic to be skipped while the GET handler executes. This results in incomplete HTTP responses and potential security controls being circumvented. The vulnerability does not require authentication or user interaction and has a CVSS 4. 0 score of 8. 7. It is fixed in NestJS version 11. 1.
AI Analysis
Technical Summary
CVE-2026-33011 is a vulnerability in the NestJS framework, a popular Node.js server-side application framework, specifically in versions 11.1.15 and earlier. The issue arises when using the @nestjs/platform-fastify GET middleware. Fastify, the underlying HTTP server framework, automatically redirects HTTP HEAD requests to the corresponding GET handlers if they exist. This behavior causes the middleware layer to be completely bypassed during HEAD requests because the middleware is not executed before the GET handler is invoked. Consequently, any security, logging, or validation logic implemented in middleware is skipped. Additionally, the HTTP response for the HEAD request is truncated and does not include a body, which is expected behavior for HEAD requests but can mask the bypass. The vulnerability is classified under CWE-670 (Always-Incorrect Control Flow Implementation), indicating a fundamental flaw in how control flow is handled in the middleware chain. The issue does not require any privileges or user interaction to exploit, making it remotely exploitable over the network. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation and significant impact on application security. The flaw was publicly disclosed on March 20, 2026, and fixed in NestJS version 11.1.16. No known exploits have been reported in the wild as of the publication date.
Potential Impact
This vulnerability can have significant impacts on organizations using affected NestJS versions with Fastify. Middleware often enforces critical security controls such as authentication, authorization, input validation, logging, and rate limiting. Bypassing middleware allows attackers to circumvent these protections, potentially gaining unauthorized access, executing unauthorized actions, or evading detection. The vulnerability affects the confidentiality and integrity of applications by allowing unauthorized request processing. Availability impact is limited but could arise if attackers exploit the bypass to trigger resource exhaustion or other denial-of-service conditions. Since the vulnerability is remotely exploitable without authentication or user interaction, it poses a high risk to exposed web services. Organizations relying on NestJS for critical backend services, especially those handling sensitive data or performing security checks in middleware, are at elevated risk. The absence of known exploits in the wild suggests limited active exploitation currently, but the high severity and ease of exploitation warrant immediate attention.
Mitigation Recommendations
The primary mitigation is to upgrade all affected NestJS applications to version 11.1.16 or later, where the issue is fixed. Until upgrade is possible, organizations should consider implementing additional request validation at the handler level to detect and reject unexpected HEAD requests or enforce middleware logic explicitly for HEAD requests. Reviewing and hardening middleware to ensure critical security checks cannot be bypassed by HTTP method manipulation is recommended. Network-level controls such as Web Application Firewalls (WAFs) can be configured to block or monitor suspicious HEAD requests targeting GET endpoints. Application logging should be enhanced to detect anomalies in request methods and response patterns. Developers should audit their use of Fastify and NestJS middleware to understand the impact of this control flow bypass and refactor code to minimize reliance on middleware for critical security enforcement. Finally, organizations should monitor security advisories for any emerging exploits and apply patches promptly.
Affected Countries
United States, Germany, United Kingdom, India, Canada, Australia, France, Netherlands, Japan, South Korea
CVE-2026-33011: CWE-670: Always-Incorrect Control Flow Implementation in nestjs nest
Description
CVE-2026-33011 is a high-severity vulnerability in NestJS versions 11. 1. 15 and below, specifically affecting applications using the @nestjs/platform-fastify GET middleware. Due to Fastify's automatic redirection of HEAD requests to GET handlers, middleware can be bypassed entirely, causing the middleware logic to be skipped while the GET handler executes. This results in incomplete HTTP responses and potential security controls being circumvented. The vulnerability does not require authentication or user interaction and has a CVSS 4. 0 score of 8. 7. It is fixed in NestJS version 11. 1.
AI-Powered Analysis
Technical Analysis
CVE-2026-33011 is a vulnerability in the NestJS framework, a popular Node.js server-side application framework, specifically in versions 11.1.15 and earlier. The issue arises when using the @nestjs/platform-fastify GET middleware. Fastify, the underlying HTTP server framework, automatically redirects HTTP HEAD requests to the corresponding GET handlers if they exist. This behavior causes the middleware layer to be completely bypassed during HEAD requests because the middleware is not executed before the GET handler is invoked. Consequently, any security, logging, or validation logic implemented in middleware is skipped. Additionally, the HTTP response for the HEAD request is truncated and does not include a body, which is expected behavior for HEAD requests but can mask the bypass. The vulnerability is classified under CWE-670 (Always-Incorrect Control Flow Implementation), indicating a fundamental flaw in how control flow is handled in the middleware chain. The issue does not require any privileges or user interaction to exploit, making it remotely exploitable over the network. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation and significant impact on application security. The flaw was publicly disclosed on March 20, 2026, and fixed in NestJS version 11.1.16. No known exploits have been reported in the wild as of the publication date.
Potential Impact
This vulnerability can have significant impacts on organizations using affected NestJS versions with Fastify. Middleware often enforces critical security controls such as authentication, authorization, input validation, logging, and rate limiting. Bypassing middleware allows attackers to circumvent these protections, potentially gaining unauthorized access, executing unauthorized actions, or evading detection. The vulnerability affects the confidentiality and integrity of applications by allowing unauthorized request processing. Availability impact is limited but could arise if attackers exploit the bypass to trigger resource exhaustion or other denial-of-service conditions. Since the vulnerability is remotely exploitable without authentication or user interaction, it poses a high risk to exposed web services. Organizations relying on NestJS for critical backend services, especially those handling sensitive data or performing security checks in middleware, are at elevated risk. The absence of known exploits in the wild suggests limited active exploitation currently, but the high severity and ease of exploitation warrant immediate attention.
Mitigation Recommendations
The primary mitigation is to upgrade all affected NestJS applications to version 11.1.16 or later, where the issue is fixed. Until upgrade is possible, organizations should consider implementing additional request validation at the handler level to detect and reject unexpected HEAD requests or enforce middleware logic explicitly for HEAD requests. Reviewing and hardening middleware to ensure critical security checks cannot be bypassed by HTTP method manipulation is recommended. Network-level controls such as Web Application Firewalls (WAFs) can be configured to block or monitor suspicious HEAD requests targeting GET endpoints. Application logging should be enhanced to detect anomalies in request methods and response patterns. Developers should audit their use of Fastify and NestJS middleware to understand the impact of this control flow bypass and refactor code to minimize reliance on middleware for critical security enforcement. Finally, organizations should monitor security advisories for any emerging exploits and apply patches promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T17:22:14.664Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bcd2fce32a4fbe5f2df42f
Added to database: 3/20/2026, 4:54:20 AM
Last enriched: 3/20/2026, 5:08:40 AM
Last updated: 3/20/2026, 6:01:45 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.