Impact
Astro versions 9.0.0 through 9.5.3 contain a flaw that bypasses the image domain and remote pattern restrictions when the inferSize feature is enabled. The server fetches remote images without checking the configured allowlist, allowing an attacker to supply arbitrary URLs. This omission permits the server to reach internal services and metadata endpoints, exposing sensitive data and enabling further attacks. The weakness is classified as CWE-918.
Affected Systems
The vulnerability affects the Astro web framework from the withastro:astro vendor. Only versions 9.0.0 through 9.5.3 are impacted; version 9.5.4 and later contain the fix.
Risk and Exploitability
The vulnerability has a CVSS score of 6.5, indicating moderate severity, and an EPSS score of less than 1%, suggesting a low but nonzero likelihood of exploitation. It is not listed in the CISA KEV catalog. An attacker who can influence image URLs—such as through user‑supplied content or a content management system—can trigger the unfiltered fetch, creating a server‑side request to any host. The risk includes potential internal network discovery and exploitation of cloud metadata services.
OpenCVE Enrichment
Github GHSA