🚨 High-severity security fix in @fastify/middie@9.3.2 just released!
Patches CVE-2026-33804 — middleware bypass via deprecated ignoreDuplicateSlashes option
github.com/fastify/midd...
Posts by Ulises Gascón
🚨 Critical-severity security fix in @fastify/middie@9.3.2 just released!
Patches CVE-2026-6270 — middleware authentication bypass in child plugin scopes
github.com/fastify/midd...
🚨 Medium-severity security fix in @fastify/static@9.1.1 just released!
Patches CVE-2026-6410 — path traversal in directory listing
github.com/fastify/fast...
🚨 Medium-severity security fix in @fastify/static@9.1.1 just released!
Patches CVE-2026-6414 — route guard bypass via encoded path separators
github.com/fastify/fast...
🚨 Medium-severity security fix in @fastify/static@9.1.1 just released!
Patches CVE-2026-6414 — route guard bypass via encoded path separators
github.com/fastify/fast...
🚨 Critical-severity security fix in @fastify/reply-from@12.6.2 and @fastify/http-proxy@11.4.4 just released!
Patches CVE-2026-33805 — connection header abuse enables stripping of proxy-added headers
github.com/fastify/fast...
🚨 Critical-severity security fix in @fastify/express@4.0.5 just released!
Patches CVE-2026-33807 — middleware path doubling causes authentication bypass in child plugin scopes
github.com/fastify/fast...
🚨 Critical-severity security fix in @fastify/express@4.0.5 just released!
Patches CVE-2026-33808 — middleware authentication bypass via URL normalization gaps (duplicate slashes and semicolons)
github.com/fastify/fast...
🚨 High-severity security fix in fastify@5.8.5 just released!
Patches CVE-2026-33806 — body schema validation bypass via leading space in Content-Type header
github.com/fastify/fast...
🔖 The latest issue of my #newsletter is live, issue 013.
March recap: 12 CVEs across #undici, #Fastify, #Lodash & #pathtoregexp, a state-actor supply chain attack on #axios, and the #Nodejs security bug bounty paused 🔐
blog.ulisesgascon.com/newsletter-i...
Bar chart and table showing security advisory reports for Lodash and Express from March 2024 to March 2026. 120 total reports: 32 accepted (26.7%), 84 closed (70%), 4 pending (3.3%). Reports spike sharply in early 2026, reaching 40 in March 2026 alone, with only 7 accepted and 31 closed. Green bars represent accepted advisories, gray bars represent closed, and orange represents pending.
🔐 7 out of 10 of #security reports for #Lodash and #Express are invalid.
The current spike is LLM-generated noise eating volunteers' time that should go to releases, features, and real bugs.
Screenshot of Newsletter #013 published on GitHub Sponsors, showing the title "Large Phishing Operations Against Maintainers" with a Published badge, the opening paragraph, the beginning of the Axios supply chain compromise section, and a screenshot of phishing emails received by the author.
Just shipped a new newsletter to Sponsors! 🎁
Covers the phishing campaign targeting #opensource maintainers (including myself), Scorecard v6, 12 CVEs patched, and the Node.js bounty program pause 🔐
Get early access & support my OSS work here: github.com/sponsors/Uli...
Same here. Open source maintainers are unsung heroes. We need better funding and protection for them. #OpenSource
This campaign is massive and a great reminder that behind your favorite Open Source dependencies are humans too!
I was also targeted, lucky that it takes me years to check my inbox 💀
The #Nodejs project's security bug bounty program is being paused due to the discontinuation of its external funding source 😞
nodejs.org/en/blog/anno...
🚀 Just released hbs@4.2.1 📦
🍿 #release details: github.com/pillarjs/hbs...
HAHAHA! At this rate I should just set up an RSS feed and save everyone the trouble 🫠
🚨 High-severity security fix in lodash@4.18.0 just released!
Patches CVE-2026-4800 — lodash vulnerable to Code Injection via _.template imports key names
github.com/lodash/lodas...
🚨 Medium-severity security fix in lodash@4.18.0 just released!
Patches CVE-2026-2950 — lodash vulnerable to Prototype Pollution via array path bypass in _.unset and _.omit
github.com/lodash/lodas...
🔒 Security update: Check out the March 2026 Security Releases for Express
Stay safe out there 🫡
expressjs.com/2026/03/30/s...
"The biggest supply-chain risk isn’t abandoned code. It’s unsupported ecosystems."
At RSAC 2026, @rginn206.bsky.social outlined a consistent pattern across ecosystems: when maintainer capacity does not scale with dependency usage, security risk increases.
Read more on the blog: bit.ly/3PzHKA0
🚨 Medium-severity security fix in path-to-regexp@8.4.0 just released!
Patches CVE-2026-4923 — path-to-regexp vulnerable to Regular Expression Denial of Service via multiple wildcards
github.com/pillarjs/pat...
🚨 High-severity security fix in path-to-regexp@8.4.0 just released!
Patches CVE-2026-4926 — path-to-regexp vulnerable to Denial of Service via sequential optional groups
github.com/pillarjs/pat...
🚨 High-severity security fix in path-to-regexp@0.1.13 just released!
Patches CVE-2026-4867 — regular Expression Denial of Service via multiple route parameters
github.com/pillarjs/pat...
🚀 Just released path-to-regexp@0.1.13 📦
🍿 #release details: github.com/pillarjs/pat...
🚨 Moderate-severity security fix in fastify@5.8.3 just released!
Patches CVE-2026-3635 — vulnerable to request (protocol and host) spoofable via X-Forwarded-Proto/Host from untrusted connections when trustProxy uses restrictive trust function
github.com/fastify/fast...
I have it! blog.ulisesgascon.com/rss.xml. Let me know if this works :)
🔖 The latest issue of my #newsletter is live, issue 012.
February in numbers: 5 CVEs patched across #Express & #Fastify, 5 releases shipped, and a hard conversation about whether #opensource security triage is still sustainable in the age of AI 🔐
blog.ulisesgascon.com/newsletter-i...