Description
@astrojs/cloudflare is an SSR adapter for use with Cloudflare Workers targets. Prior to 13.1.10, the fetch() call for remote images in packages/integrations/cloudflare/src/utils/image-binding-transform.ts uses the default redirect: 'follow' behavior. This allows the Cloudflare Worker to follow HTTP redirects to arbitrary URLs, bypassing the isRemoteAllowed() domain allowlist check which only validates the initial URL. This vulnerabiity is caused by an incomplete fix for CVE-2025-58179. This vulnerability is fixed in 13.1.10.
Published: 2026-04-24
Score: 2.2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Remote Server Side Request Forgery
Action: Apply Update
AI Analysis

Impact

The vulnerability resides in the @astrojs/cloudflare adapter, where the fetch() call used for remote images follows HTTP redirects by default. This bypasses the isRemoteAllowed() domain allowlist which only validates the initial URL, enabling the Cloudflare Worker to request arbitrary URLs. The result is an SSRF condition that could allow an attacker to access internal network resources, causing potential confidentiality and availability impacts.

Affected Systems

Vendors and products affected are the withastro collection, specifically the @astrojs/cloudflare adapter. Any installation using versions earlier than 13.1.10 is vulnerable. Versions 13.1.10 and later contain the fix.

Risk and Exploitability

The CVSS base score is 2.2, indicating a low severity, and the EPSS score is below 1%, suggesting a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to execute JavaScript in the Cloudflare Worker context, which is a typical remote code path for the adapter. Because the flaw arises from automatic redirection handling, an attacker can simply supply a malicious URL to trigger the redirect cycle. However, due to the low exploitation probability, this vulnerability is unlikely to see widescale use, but should still be remediated promptly.

Generated by OpenCVE AI on April 28, 2026 at 13:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade @astrojs/cloudflare to version 13.1.10 or newer
  • Configure fetch calls to disable automatic redirects (e.g., set redirect:'manual') and add explicit domain validation for any redirects that occur
  • Audit and review Cloudflare Worker code to ensure only trusted image URLs are used in image-binding-transform and remove any hard‑coded or externally supplied URLs
  • Monitor outbound HTTP traffic from Workers for unexpected or unauthorized destinations to detect potential misuse

Generated by OpenCVE AI on April 28, 2026 at 13:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-88gm-j2wx-58h6 Cloudflare has SSRF via redirect following through its image-binding-transform endpoint (incomplete fix for GHSA-qpr4)
History

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Withastro
Withastro astro
Vendors & Products Withastro
Withastro astro

Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description @astrojs/cloudflare is an SSR adapter for use with Cloudflare Workers targets. Prior to 13.1.10, the fetch() call for remote images in packages/integrations/cloudflare/src/utils/image-binding-transform.ts uses the default redirect: 'follow' behavior. This allows the Cloudflare Worker to follow HTTP redirects to arbitrary URLs, bypassing the isRemoteAllowed() domain allowlist check which only validates the initial URL. This vulnerabiity is caused by an incomplete fix for CVE-2025-58179. This vulnerability is fixed in 13.1.10.
Title @astrojs/cloudflare: SSRF via redirect following in Cloudflare image-binding-transform endpoint
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 2.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-24T18:33:24.408Z

Reserved: 2026-04-20T14:01:46.671Z

Link: CVE-2026-41321

cve-icon Vulnrichment

Updated: 2026-04-24T18:27:22.745Z

cve-icon NVD

Status : Deferred

Published: 2026-04-24T18:16:28.783

Modified: 2026-04-27T18:53:00.053

Link: CVE-2026-41321

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:45:06Z

Weaknesses