Vulnerability Description
Nest is a framework for building scalable Node.js server-side applications. Versions prior to 11.1.11 have a Fastify URL encoding middleware bypass. A NestJS application is vulnerable if it uses `@nestjs/platform-fastify`; relies on `NestMiddleware` (via `MiddlewareConsumer`) for security checks (authentication, authorization, etc.), or through `app.use()`; and applies middleware to specific routes using string paths or controllers (e.g., `.forRoutes('admin')`). Exploitation can result in unauthenticated users accessing protected routes, restricted administrative endpoints becoming accessible to lower-privileged users, and/or middleware performing sanitization or validation being skipped. This issue is patched in `@nestjs/[email protected]`.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nestjs | Nest | < 11.1.11 |
Related Weaknesses (CWE)
References
- https://github.com/nestjs/nest/commit/c4cedda15a05aafec1e6045b36b0335ab850e771Patch
- https://github.com/nestjs/nest/security/advisories/GHSA-8wpr-639p-ccrjExploitVendor Advisory
FAQ
What is CVE-2025-69211?
CVE-2025-69211 is a vulnerability with a CVSS score of 7.4 (HIGH). Nest is a framework for building scalable Node.js server-side applications. Versions prior to 11.1.11 have a Fastify URL encoding middleware bypass. A NestJS application is vulnerable if it uses `@nes...
How severe is CVE-2025-69211?
CVE-2025-69211 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-69211?
Check the references section above for vendor advisories and patch information. Affected products include: Nestjs Nest.