Astro is a web framework. Starting in version 5.2.0 and prior to version 5.15.6, a Reflected Cross-Site Scripting (XSS) vulnerability exists in Astro's development server error pages when the `trailingSlash` configuration option is used. An attacker can inject arbitrary JavaScript code that executes in the victim's browser context by crafting a malicious URL. While this vulnerability only affects the development server and not production builds, it could be exploited to compromise developer environments through social engineering or malicious links. Version 5.15.6 fixes the issue.
References
Configurations
History
25 Nov 2025, 15:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:* | |
| First Time |
Astro astro
Astro |
|
| References | () https://github.com/withastro/astro/blob/5bc37fd5cade62f753aef66efdf40f982379029a/packages/astro/src/template/4xx.ts#L133-L149 - Product | |
| References | () https://github.com/withastro/astro/commit/790d9425f39bbbb462f1c27615781cd965009f91 - Patch | |
| References | () https://github.com/withastro/astro/pull/12994 - Patch | |
| References | () https://github.com/withastro/astro/security/advisories/GHSA-w2vj-39qv-7vh7 - Exploit, Third Party Advisory |
13 Nov 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-13 21:15
Updated : 2025-11-25 15:13
NVD link : CVE-2025-64745
Mitre link : CVE-2025-64745
CVE.ORG link : CVE-2025-64745
JSON object : View
Products Affected
astro
- astro
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
