Description
Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin. This issue is fixed in version 12.6.6.
Published: 2025-09-04
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26878 Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin. This issue is fixed in version 12.6.6.
Github GHSA Github GHSA GHSA-qpr4-c339-7vq8 Server-Side Request Forgery via /_image endpoint in Astro Cloudflare adapter
History

Mon, 22 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Astro
Astro \@astrojs\/cloudflare
CPEs cpe:2.3:a:astro:\@astrojs\/cloudflare:*:*:*:*:*:node.js:*:*
Vendors & Products Astro
Astro \@astrojs\/cloudflare

Fri, 05 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 05 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Withastro
Withastro astro
Vendors & Products Withastro
Withastro astro

Thu, 04 Sep 2025 23:45:00 +0000

Type Values Removed Values Added
Description Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin. This issue is fixed in version 12.6.6.
Title Astro Cloudflare adapter is vulnerable to Server-Side Request Forgery via /_image endpoint
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Astro \@astrojs\/cloudflare
Withastro Astro
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-05T14:53:29.299Z

Reserved: 2025-08-27T13:34:56.190Z

Link: CVE-2025-58179

cve-icon Vulnrichment

Updated: 2025-09-05T14:53:24.027Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-05T00:15:32.087

Modified: 2025-12-22T20:08:22.513

Link: CVE-2025-58179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-05T14:01:52Z

Weaknesses