Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Affecting astro package, versions <5.14.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-ASTRO-13535085
  • published12 Oct 2025
  • disclosed10 Oct 2025
  • creditChris Graham

Introduced: 10 Oct 2025

NewCVE-2025-61925  (opens in a new tab)
CWE-470  (opens in a new tab)

How to fix?

Upgrade astro to version 5.14.3 or higher.

Overview

astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind.

Affected versions of this package are vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') via the X-Forwarded-Host header when using the Astro.url property without validation. An attacker can manipulate output content and potentially cause users to be redirected to malicious sites, allowing login credentials theft by sending crafted headers.

Note:

  1. This is only exploitable if the application is deployed in on-demand/dynamic rendering mode.

  2. In case of using a caching proxy, any page which is cached could persist the malicious value for subsequent users.

References

CVSS Base Scores

version 4.0
version 3.1