CVE-2026-33769 PUBLISHED

Astro: Remote allowlist bypass via unanchored matchPathname wildcard

Assigner: GitHub_M
Reserved: 23.03.2026 Published: 24.03.2026 Updated: 24.03.2026

Astro is a web framework. From version 2.10.10 to before version 5.18.1, this issue concerns Astro's remotePatterns path enforcement for remote URLs used by server-side fetchers such as the image optimization endpoint. The path matching logic for /* wildcards is unanchored, so a pathname that contains the allowed prefix later in the path can still match. As a result, an attacker can fetch paths outside the intended allowlisted prefix on an otherwise allowed host. This issue has been patched in version 5.18.1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 2.9

Product Status

Vendor withastro
Product astro
Versions
  • Version >= 2.10.10, < 5.18.1 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE