CVE-2026-33769
MEDIUMAstro: Remote allowlist bypass via unanchored matchPathname wildcard
Title source: cnaDescription
Astro is a web framework. From version 2.10.10 to before version 5.18.1, this issue concerns Astro's remotePatterns path enforcement for remote URLs used by server-side fetchers such as the image optimization endpoint. The path matching logic for /* wildcards is unanchored, so a pathname that contains the allowed prefix later in the path can still match. As a result, an attacker can fetch paths outside the intended allowlisted prefix on an otherwise allowed host. This issue has been patched in version 5.18.1.
Scores
CVSS v3
5.3
EPSS
0.0003
EPSS Percentile
8.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-20
Status
published
Products (3)
astro/astro
2.10.10 - 5.18.1
npm/astro
2.10.10 - 5.18.1npm
withastro/astro
>= 2.10.10, < 5.18.1
Published
Mar 24, 2026
Tracked Since
Mar 25, 2026