CVE-2025-61925
BaseFortify
Publication date: 2025-10-10
Last updated on: 2025-12-04
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| astro | astro | to 5.14.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-470 | The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Astro web framework versions prior to 5.14.2 involves the reflection of the 'X-Forwarded-Host' header value in the output of 'Astro.url' without validation. A malicious user can send a request with a mismatched 'Host' and 'X-Forwarded-Host' header, causing Astro to return the malicious 'X-Forwarded-Host' value. This can manipulate URLs generated by 'Astro.url', such as canonical links or login/registration URLs, potentially redirecting users to malicious sites. If a caching proxy is used, the malicious value could be cached and served to other users.
How can this vulnerability impact me? :
The vulnerability can lead to URL manipulation, allowing attackers to redirect users to malicious sites through manipulated canonical links or login/registration URLs. This could result in credential theft or phishing attacks. Additionally, if a caching proxy is used, the malicious URL could be cached and served to other users, increasing the impact beyond the initial attacker.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Astro to version 5.14.2 or later, as this version contains a fix for the vulnerability. Additionally, consider implementing validation or an allowlist for the 'X-Forwarded-Host' header to prevent malicious values from being reflected in output. If using a caching proxy, ensure that cached pages do not persist malicious header values.