CVE-2025-64525

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-64525
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64525.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64525
Aliases
Published
2025-11-13T15:58:16.797Z
Modified
2025-12-05T10:21:45.415320Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
Summary
Astro: URL manipulation via unsanitized headers leads to path-based middleware protections bypass, potential SSRF/cache-poisoning, CVE-2025-61925 bypass
Details

Astro is a web framework. In Astro versions 2.16.0 up to but excluding 5.15.5 which utilizeon-demand rendering, request headers x-forwarded-proto and x-forwarded-port are insecurely used, without sanitization, to build the URL. This has several consequences, the most important of which are: middleware-based protected route bypass (only via x-forwarded-proto), DoS via cache poisoning (if a CDN is present), SSRF (only via x-forwarded-proto), URL pollution (potential SXSS, if a CDN is present), and WAF bypass. Version 5.15.5 contains a patch.

Database specific
{
    "cwe_ids": [
        "CWE-918"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64525.json"
}
References

Affected packages

Git / github.com/withastro/astro

Affected ranges

Type
GIT
Repo
https://github.com/withastro/astro
Events

Affected versions

@astrojs/language-server@2.*

@astrojs/language-server@2.16.0

@astrojs/mdx@4.*

@astrojs/mdx@4.3.10

@astrojs/preact@4.*

@astrojs/preact@4.1.3

@astrojs/react@4.*

@astrojs/react@4.4.2

@astrojs/solid-js@5.*

@astrojs/solid-js@5.1.3

@astrojs/svelte@7.*

@astrojs/svelte@7.2.2

@astrojs/vue@5.*

@astrojs/vue@5.1.3

astro-vscode@2.*

astro-vscode@2.16.0

astro@5.*

astro@5.15.3
astro@5.15.4