CVE-2026-33011
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
20/03/2026
Last modified:
23/03/2026
Description
Nest is a framework for building scalable Node.js server-side applications. In versions 11.1.15 and below, a NestJS application using @nestjs/platform-fastify GET middleware can be bypassed because Fastify automatically redirects HEAD requests to the corresponding GET handlers (if they exist). As a result: middleware will be completely skipped, the HTTP response won't include a body (since the response is truncated when redirecting a HEAD request to a GET handler), and the actual handler will still be executed. This issue is fixed in version 11.1.16.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nestjs:nest:*:*:*:*:*:node.js:*:* | 11.1.16 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



