Home

Description

Astro is a web framework. Prior to version 5.15.8, a mismatch exists between how Astro normalizes request paths for routing/rendering and how the application’s middleware reads the path for validation checks. Astro internally applies decodeURI() to determine which route to render, while the middleware uses context.url.pathname without applying the same normalization (decodeURI). This discrepancy may allow attackers to reach protected routes using encoded path variants that pass routing but bypass validation checks. This issue has been patched in version 5.15.8.

PUBLISHED Reserved 2025-11-10 | Published 2025-11-19 | Updated 2025-11-20 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 5.15.8
affected

References

github.com/.../astro/security/advisories/GHSA-ggxq-hp9w-j794

github.com/...ommit/6f800813516b07bbe12c666a92937525fddb58ce

cve.org (CVE-2025-64765)

nvd.nist.gov (CVE-2025-64765)

Download JSON