Astro is a web framework. Versions 5.15.7 and below have a double URL encoding bypass which allows any unauthenticated attacker to bypass path-based authentication checks in Astro middleware, granting unauthorized access to protected routes. While the original CVE-2025-64765 was fixed in v5.15.8, the fix is insufficient as it only decodes once. By using double-encoded URLs, attackers can still bypass authentication and access any route protected by middleware pathname checks. This issue is fixed in version 5.15.8.
References
Configurations
History
10 Dec 2025, 23:46
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/withastro/astro/commit/6f800813516b07bbe12c666a92937525fddb58ce - Patch | |
| References | () https://github.com/withastro/astro/security/advisories/GHSA-ggxq-hp9w-j794 - Not Applicable | |
| References | () https://github.com/withastro/astro/security/advisories/GHSA-whqg-ppgf-wp8c - Vendor Advisory | |
| First Time |
Astro astro
Astro |
|
| CPE | cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:* |
09 Dec 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 00:15
Updated : 2025-12-10 23:46
NVD link : CVE-2025-66202
Mitre link : CVE-2025-66202
CVE.ORG link : CVE-2025-66202
JSON object : View
Products Affected
astro
- astro
CWE
CWE-647
Use of Non-Canonical URL Paths for Authorization Decisions
