CVE-2026-33768
MEDIUMAstro: Unauthenticated Path Override via `x-astro-path` / `x_astro_path`
Title source: cnaDescription
Astro is a web framework. Prior to version 10.0.2, the @astrojs/vercel serverless entrypoint reads the x-astro-path header and x_astro_path query parameter to rewrite the internal request path, with no authentication whatsoever. On deployments without Edge Middleware, this lets anyone bypass Vercel's platform-level path restrictions entirely. The override preserves the original HTTP method and body, so this isn't limited to GET. POST, PUT, DELETE all land on the rewritten path. A Firewall rule blocking /admin/* does nothing when the request comes in as POST /api/health?x_astro_path=/admin/delete-user. This issue has been patched in version 10.0.2.
Scores
CVSS v3
6.5
EPSS
0.0005
EPSS Percentile
14.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-441
CWE-862
Status
published
Products (3)
astro/\@astrojs\/vercel
< 10.0.2
astrojs/vercel
0 - 10.0.2npm
withastro/astro
< 10.0.2
Published
Mar 24, 2026
Tracked Since
Mar 25, 2026