Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Affecting @astrojs/node package, versions <9.4.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-ASTROJSNODE-13535086
  • published12 Oct 2025
  • disclosed10 Oct 2025
  • creditChris Graham

Introduced: 10 Oct 2025

NewCVE-2025-61925  (opens in a new tab)
CWE-470  (opens in a new tab)

How to fix?

Upgrade @astrojs/node to version 9.4.5 or higher.

Overview

@astrojs/node is a Deploy your site to a Node.js server

Affected versions of this package are vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') via the X-Forwarded-Host header when using the Astro.url property without validation. An attacker can manipulate output content and potentially cause users to be redirected to malicious sites, allowing login credentials theft by sending crafted headers.

Note:

  1. This is only exploitable if the application is deployed in on-demand/dynamic rendering mode.

  2. In case of using a caching proxy, any page which is cached could persist the malicious value for subsequent users.

References

CVSS Base Scores

version 4.0
version 3.1