CVE-2025-64757
JavaScript Análisis y mitigación de vulnerabilidades

Vista general

A vulnerability (CVE-2025-64757) has been identified in the Astro framework's development server that allows arbitrary local file read access through the image optimization endpoint. The vulnerability was discovered in November 2025 and affects Astro development environments running versions < 5.14.3. This security flaw enables remote attackers to read any image file accessible to the Node.js process on the host system (GitHub Advisory).

Técnicas

The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-23 (Relative Path Traversal). It exists in the Node.js image endpoint handler used during development mode, specifically in the /packages/astro/src/assets/endpoint/node.ts component. The vulnerability has a CVSS v3.1 base score of 3.5 (Low severity) with the vector string CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N. The development branch bypasses the security checks that exist in the production code path, which normally validates that file paths are within the allowed assets directory (GitHub Advisory).

Impacto

The vulnerability has a HIGH confidentiality impact, allowing attackers to read any image file accessible to the Node.js process via HTTP response. While the vulnerability does not affect system integrity or availability directly, it could potentially be used for resource exhaustion through repeated large image requests. The scope is limited to the local development environment (GitHub Advisory).

Mitigación y soluciones alternativas

The vulnerability has been patched in Astro version 5.14.3 and later. Users are advised to upgrade to the patched version to prevent potential exploitation. The production environment is not affected as it implements proper path validation (GitHub Advisory).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado JavaScript Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-65099HIGH7.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoNov 19, 2025
CVE-2025-64764HIGH7.1
  • JavaScriptJavaScript
  • astro
NoNov 19, 2025
CVE-2025-64765MEDIUM6.9
  • JavaScriptJavaScript
  • astro
NoNov 19, 2025
CVE-2025-65019MEDIUM5.4
  • JavaScriptJavaScript
  • astro
NoNov 19, 2025
CVE-2025-64757LOW3.5
  • JavaScriptJavaScript
  • astro
NoNov 19, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades