CVE-2026-33768

Astro is a web framework. Prior to version 10.0.2, the @astrojs/vercel serverless entrypoint reads the x-astro-path header and x_astro_path query parameter to rewrite the internal request path, with no authentication whatsoever. On deployments without Edge Middleware, this lets anyone bypass Vercel's platform-level path restrictions entirely. The override preserves the original HTTP method and body, so this isn't limited to GET. POST, PUT, DELETE all land on the rewritten path. A Firewall rule blocking /admin/* does nothing when the request comes in as POST /api/health?x_astro_path=/admin/delete-user. This issue has been patched in version 10.0.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:astro:\@astrojs\/vercel:*:*:*:*:*:*:*:*

History

26 Mar 2026, 13:37

Type Values Removed Values Added
CPE cpe:2.3:a:astro:\@astrojs\/vercel:*:*:*:*:*:*:*:*
References () https://github.com/withastro/astro/commit/335a204161f5a7293c128db570901d4f8639c6ed - () https://github.com/withastro/astro/commit/335a204161f5a7293c128db570901d4f8639c6ed - Patch
References () https://github.com/withastro/astro/pull/15959 - () https://github.com/withastro/astro/pull/15959 - Issue Tracking
References () https://github.com/withastro/astro/releases/tag/%40astrojs%2Fvercel%4010.0.2 - () https://github.com/withastro/astro/releases/tag/%40astrojs%2Fvercel%4010.0.2 - Release Notes
References () https://github.com/withastro/astro/security/advisories/GHSA-mr6q-rp88-fx84 - () https://github.com/withastro/astro/security/advisories/GHSA-mr6q-rp88-fx84 - Exploit, Vendor Advisory
First Time Astro \@astrojs\/vercel
Astro

25 Mar 2026, 15:41

Type Values Removed Values Added
Summary
  • (es) Astro es un web framework. Antes de la versión 10.0.2, el punto de entrada sin servidor @astrojs/vercel lee la cabecera x-astro-path y el parámetro de consulta x_astro_path para reescribir la ruta de solicitud interna, sin autenticación alguna. En despliegues sin Edge Middleware, esto permite a cualquiera eludir por completo las restricciones de ruta a nivel de plataforma de Vercel. La anulación preserva el método HTTP y el cuerpo originales, por lo que esto no se limita a GET. POST, PUT, DELETE todos aterrizan en la ruta reescrita. Una regla de cortafuegos que bloquea /admin/* no hace nada cuando la solicitud llega como POST /api/health?x_astro_path=/admin/delete-user. Este problema ha sido parcheado en la versión 10.0.2.

24 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 19:16

Updated : 2026-03-26 13:37


NVD link : CVE-2026-33768

Mitre link : CVE-2026-33768

CVE.ORG link : CVE-2026-33768


JSON object : View

Products Affected

astro

  • \@astrojs\/vercel
CWE
CWE-441

Unintended Proxy or Intermediary ('Confused Deputy')

CWE-862

Missing Authorization