CVE-2025-59837
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-11-25
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| astro | astro | From 5.13.4 (inc) to 5.13.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Astro web framework's image proxy component in versions 5.13.4 up to before 5.13.10. It allows an attacker to bypass domain validation by using backslashes in the href parameter, which can cause the server to make requests to arbitrary URLs. This can lead to server-side request forgery (SSRF) and potentially cross-site scripting (XSS). The issue is due to an incomplete fix of a previous vulnerability (CVE-2025-58179) and was fixed in version 5.13.10.
How can this vulnerability impact me? :
The vulnerability can allow attackers to make the server perform unauthorized requests to arbitrary URLs (SSRF), which can be used to access internal systems or sensitive information. Additionally, it may enable cross-site scripting (XSS), potentially compromising user data or session information. This can lead to data leakage, unauthorized access, or other security breaches.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Astro to version 5.13.10 or later, as this version contains the fix for the image proxy domain validation bypass vulnerability.