Description
Astro is a web framework. Prior to version 5.15.8, a mismatch exists between how Astro normalizes request paths for routing/rendering and how the application’s middleware reads the path for validation checks. Astro internally applies decodeURI() to determine which route to render, while the middleware uses context.url.pathname without applying the same normalization (decodeURI). This discrepancy may allow attackers to reach protected routes using encoded path variants that pass routing but bypass validation checks. This issue has been patched in version 5.15.8.
References (2)
Core 2
Core References
Exploit, Mitigation, Third Party Advisory x_refsource_confirm
https://github.com/withastro/astro/security/advisories/GHSA-ggxq-hp9w-j794
Scores
CVSS v3
5.3
EPSS
0.0003
EPSS Percentile
8.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (2)
astro/astro
< 5.15.8
npm/astro
0 - 5.15.8npm
Published
Nov 19, 2025
Tracked Since
Feb 18, 2026