5.16.6
4 years ago
19 days ago
Known vulnerabilities in the astro package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Use of Non-Canonical URL Paths for Authorization Decisions due to improper URL decoding logic. The pathname validation used for protecting routes decodes the request path only once, allowing double-encoded sequences to bypass path-based authentication checks. An attacker can exploit this by submitting double-encoded URLs to access protected routes such as /admin or /api/internal, enabling unauthorized access to restricted functionality. Note: There has been an attempt to fix this vulnerability in version 5.15.8 following CVE-2025-64765, but the fix is insufficient. How to fix Use of Non-Canonical URL Paths for Authorization Decisions? Upgrade | <5.16.3 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Directory Traversal via a mismatch in path normalization between routing and middleware validation. An attacker can access protected routes by sending requests with URL-encoded path variants that bypass authentication checks. How to fix Directory Traversal? Upgrade | <5.15.8 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Relative Path Traversal via the How to fix Relative Path Traversal? Upgrade | <5.14.3 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade | <5.15.8 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the Note: This is also a bypass of the fix for CVE-2025-61925. How to fix Server-side Request Forgery (SSRF)? Upgrade | <5.15.5 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') via the Note:
How to fix Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')? Upgrade | <5.14.3 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Note: This vulnerability is only exploitable in projects using the How to fix Cross-site Scripting (XSS)? Upgrade | <4.16.19>=5.0.0-alpha.0 <5.13.2 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Storage of File with Sensitive Data Under Web Root due to the exposure of sourcemap files in publicly accessible directories during the build process. An attacker can access and reconstruct server-side source code by making unauthorized HTTP GET requests to the server hosting the website. Note: This is only exploitable if sourcemaps are enabled. How to fix Storage of File with Sensitive Data Under Web Root? Upgrade | <4.16.18>=5.0.0-alpha.0 <5.0.8 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) through the function How to fix Cross-site Request Forgery (CSRF)? Upgrade | <4.16.17 |
astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user input sanitization and insecure usage of How to fix Cross-site Scripting (XSS)? Upgrade | <4.12.2 |