Metrics
Affected Vendors & Products
Thu, 26 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Astro
Astro astro |
|
| CPEs | cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Astro
Astro astro |
|
| Metrics |
cvssV3_1
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Withastro
Withastro astro |
|
| Vendors & Products |
Withastro
Withastro astro |
Tue, 24 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Astro is a web framework. From version 2.10.10 to before version 5.18.1, this issue concerns Astro's remotePatterns path enforcement for remote URLs used by server-side fetchers such as the image optimization endpoint. The path matching logic for /* wildcards is unanchored, so a pathname that contains the allowed prefix later in the path can still match. As a result, an attacker can fetch paths outside the intended allowlisted prefix on an otherwise allowed host. This issue has been patched in version 5.18.1. | |
| Title | Astro: Remote allowlist bypass via unanchored matchPathname wildcard | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T20:13:25.845Z
Reserved: 2026-03-23T18:30:14.127Z
Link: CVE-2026-33769
Updated: 2026-03-24T20:13:11.332Z
Status : Analyzed
Published: 2026-03-24T19:16:55.837
Modified: 2026-03-26T12:04:56.100
Link: CVE-2026-33769
No data.