Astro is a web framework for content-driven websites. In versions of astro before 5.13.2 and 4.16.18, the image optimization endpoint in projects deployed with on-demand rendering allows images from unauthorized third-party domains to be served. On-demand rendered sites built with Astro include an /_image endpoint which returns optimized versions of images. A bug in impacted versions of astro allows an attacker to bypass the third-party domain restrictions by using a protocol-relative URL as the image source, e.g. /_image?href=//example.com/image.png. This vulnerability is fixed in 5.13.2 and 4.16.18.
References
| Link | Resource |
|---|---|
| https://github.com/withastro/astro/commit/4d16de7f95db5d1ec1ce88610d2a95e606e83820 | Patch |
| https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749 | Exploit Vendor Advisory |
| https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Nov 2025, 14:31
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| First Time |
Astro astro
Astro |
|
| CPE | cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/withastro/astro/commit/4d16de7f95db5d1ec1ce88610d2a95e606e83820 - Patch | |
| References | () https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749 - Exploit, Vendor Advisory |
Information
Published : 2025-08-19 19:15
Updated : 2025-11-25 14:31
NVD link : CVE-2025-55303
Mitre link : CVE-2025-55303
CVE.ORG link : CVE-2025-55303
JSON object : View
Products Affected
astro
- astro
