Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ggxq-hp9w-j794 | Astro's middleware authentication checks based on url.pathname can be bypassed via url encoded values |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 19 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Astro is a web framework. Prior to version 5.15.8, a mismatch exists between how Astro normalizes request paths for routing/rendering and how the application’s middleware reads the path for validation checks. Astro internally applies decodeURI() to determine which route to render, while the middleware uses context.url.pathname without applying the same normalization (decodeURI). This discrepancy may allow attackers to reach protected routes using encoded path variants that pass routing but bypass validation checks. This issue has been patched in version 5.15.8. | |
| Title | Astro middleware authentication checks based on url.pathname can be bypassed via url encoded values | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-20T15:50:41.540Z
Reserved: 2025-11-10T22:29:34.877Z
Link: CVE-2025-64765
Updated: 2025-11-19T21:07:54.357Z
Status : Awaiting Analysis
Published: 2025-11-19T17:15:52.827
Modified: 2025-11-19T19:14:59.327
Link: CVE-2025-64765
No data.
OpenCVE Enrichment
No data.
Github GHSA