Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-whqg-ppgf-wp8c | Astro has an Authentication Bypass via Double URL Encoding, a bypass for CVE-2025-64765 |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 11 Dec 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Astro
Astro astro |
|
| CPEs | cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Astro
Astro astro |
Tue, 09 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Withastro
Withastro astro |
|
| Vendors & Products |
Withastro
Withastro astro |
Tue, 09 Dec 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Astro is a web framework. Versions 5.15.7 and below have a double URL encoding bypass which allows any unauthenticated attacker to bypass path-based authentication checks in Astro middleware, granting unauthorized access to protected routes. While the original CVE-2025-64765 was fixed in v5.15.8, the fix is insufficient as it only decodes once. By using double-encoded URLs, attackers can still bypass authentication and access any route protected by middleware pathname checks. This issue is fixed in version 5.15.8. | |
| Title | Astro has an Authentication Bypass via Double URL Encoding, a bypass for CVE-2025-64765 | |
| Weaknesses | CWE-647 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-09T16:04:07.923Z
Reserved: 2025-11-24T23:01:29.677Z
Link: CVE-2025-66202
Updated: 2025-12-09T14:18:24.198Z
Status : Analyzed
Published: 2025-12-09T00:15:48.977
Modified: 2025-12-10T23:46:47.670
Link: CVE-2025-66202
No data.
OpenCVE Enrichment
Updated: 2025-12-09T10:04:42Z
Github GHSA