Home

Description

Astro is a web framework for content-driven websites. In versions of astro before 5.13.2 and 4.16.18, the image optimization endpoint in projects deployed with on-demand rendering allows images from unauthorized third-party domains to be served. On-demand rendered sites built with Astro include an /_image endpoint which returns optimized versions of images. A bug in impacted versions of astro allows an attacker to bypass the third-party domain restrictions by using a protocol-relative URL as the image source, e.g. /_image?href=//example.com/image.png. This vulnerability is fixed in 5.13.2 and 4.16.18.

PUBLISHED Reserved 2025-08-12 | Published 2025-08-19 | Updated 2025-08-19 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-115: Misinterpretation of Input

Product status

>= 5.0.0-alpha.0, < 5.13.2
affected

< 4.16.18
affected

References

github.com/.../astro/security/advisories/GHSA-xf8x-j4p2-f749

github.com/...ommit/4d16de7f95db5d1ec1ce88610d2a95e606e83820

cve.org (CVE-2025-55303)

nvd.nist.gov (CVE-2025-55303)

Download JSON