Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v66j-6wwf-jc57 | Mercurius: Incorrect Content-Type parsing can lead to CSRF attack |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mercurius is a GraphQL adapter for Fastify. Prior to version 16.4.0, a cross-site request forgery (CSRF) vulnerability was identified. The issue arises from incorrect parsing of the Content-Type header in requests. Specifically, requests with Content-Type values such as application/x-www-form-urlencoded, multipart/form-data, or text/plain could be misinterpreted as application/json. This misinterpretation bypasses the preflight checks performed by the fetch() API, potentially allowing unauthorized actions to be performed on behalf of an authenticated user. This issue has been patched in version 16.4.0. | |
| Title | Mercurius: Incorrect Content-Type parsing can lead to CSRF attack | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-05T16:34:35.585Z
Reserved: 2025-10-28T21:07:16.438Z
Link: CVE-2025-64166
Updated: 2026-03-05T16:34:28.593Z
Status : Awaiting Analysis
Published: 2026-03-05T16:16:11.310
Modified: 2026-03-05T19:38:33.877
Link: CVE-2025-64166
No data.
OpenCVE Enrichment
No data.
Github GHSA