CVE-2025-64757

Astro is a web framework. Prior to version 5.14.3, a vulnerability has been identified in the Astro framework's development server that allows arbitrary local file read access through the image optimization endpoint. The vulnerability affects Astro development environments and allows remote attackers to read any image file accessible to the Node.js process on the host system. This issue has been patched in version 5.14.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:*

History

20 Nov 2025, 17:58

Type Values Removed Values Added
References () https://github.com/withastro/astro/commit/b8ca69b97149becefaf89bf21853de9c905cdbb7 - () https://github.com/withastro/astro/commit/b8ca69b97149becefaf89bf21853de9c905cdbb7 - Patch
References () https://github.com/withastro/astro/security/advisories/GHSA-x3h8-62x9-952g - () https://github.com/withastro/astro/security/advisories/GHSA-x3h8-62x9-952g - Exploit, Vendor Advisory
CPE cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:*
First Time Astro astro
Astro

19 Nov 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-19 17:15

Updated : 2025-11-20 17:58


NVD link : CVE-2025-64757

Mitre link : CVE-2025-64757

CVE.ORG link : CVE-2025-64757


JSON object : View

Products Affected

astro

  • astro
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal