Home

Description

Astro is a web framework. Versions 5.15.7 and below have a double URL encoding bypass which allows any unauthenticated attacker to bypass path-based authentication checks in Astro middleware, granting unauthorized access to protected routes. While the original CVE-2025-64765 was fixed in v5.15.8, the fix is insufficient as it only decodes once. By using double-encoded URLs, attackers can still bypass authentication and access any route protected by middleware pathname checks. This issue is fixed in version 5.15.8.

PUBLISHED Reserved 2025-11-24 | Published 2025-12-08 | Updated 2025-12-09 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-647: Use of Non-Canonical URL Paths for Authorization Decisions

Product status

< 5.15.8
affected

References

github.com/.../astro/security/advisories/GHSA-whqg-ppgf-wp8c

github.com/.../astro/security/advisories/GHSA-ggxq-hp9w-j794

github.com/...ommit/6f800813516b07bbe12c666a92937525fddb58ce

cve.org (CVE-2025-66202)

nvd.nist.gov (CVE-2025-66202)

Download JSON