Home

Description

Astro is a web framework. Starting in version 5.2.0 and prior to version 5.15.6, a Reflected Cross-Site Scripting (XSS) vulnerability exists in Astro's development server error pages when the `trailingSlash` configuration option is used. An attacker can inject arbitrary JavaScript code that executes in the victim's browser context by crafting a malicious URL. While this vulnerability only affects the development server and not production builds, it could be exploited to compromise developer environments through social engineering or malicious links. Version 5.15.6 fixes the issue.

PUBLISHED Reserved 2025-11-10 | Published 2025-11-13 | Updated 2025-11-13 | Assigner GitHub_M




LOW: 2.7CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 5.2.0, < 5.15.6
affected

References

github.com/.../astro/security/advisories/GHSA-w2vj-39qv-7vh7

github.com/withastro/astro/pull/12994

github.com/...ommit/790d9425f39bbbb462f1c27615781cd965009f91

github.com/...f982379029a/packages/astro/src/template/4xx.ts

cve.org (CVE-2025-64745)

nvd.nist.gov (CVE-2025-64745)

Download JSON