CVE-2025-65019
JavaScript Análisis y mitigación de vulnerabilidades

Vista general

A critical vulnerability (CVE-2025-65019) was discovered in Astro's Cloudflare adapter (@astrojs/cloudflare) affecting versions below 5.15.9. The vulnerability exists in the /_image endpoint when using output: 'server' configuration, where the isRemoteAllowed() function incorrectly allows data: protocol URLs without proper validation. This vulnerability was disclosed on November 19, 2025, and has been patched in version 5.15.9 (GitHub Advisory).

Técnicas

The vulnerability stems from a flaw in the isRemoteAllowed() function located in packages/internal-helpers/src/remote.ts. The function unconditionally allows all data: protocol URLs without any validation or sanitization, bypassing domain restrictions and Content Security Policy protections. The vulnerability has been assigned a CVSS score of 5.4 (Moderate) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N. The issue is classified as CWE-79: Improper Neutralization of Input During Web Page Generation (GitHub Advisory).

Impacto

The vulnerability can lead to several serious security implications including: Stored Cross-Site Scripting (XSS) allowing execution of malicious JavaScript in victims' browsers, potential session hijacking through access to cookies and session tokens, possible account takeover when combined with CSRF attacks, and data exfiltration where sensitive information can be stolen and transmitted to attacker-controlled servers (GitHub Advisory).

Mitigación y soluciones alternativas

The vulnerability has been patched in version 5.15.9 of the package. Users should upgrade to this version or later. For those who need to use data URIs for remote images, they must explicitly authorize them by updating their astro.config.mjs file to include specific remotePatterns configuration that allows the data protocol (GitHub Advisory, Astro Commit).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado JavaScript Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-65099HIGH7.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoNov 19, 2025
CVE-2025-64764HIGH7.1
  • JavaScriptJavaScript
  • astro
NoNov 19, 2025
CVE-2025-64765MEDIUM6.9
  • JavaScriptJavaScript
  • astro
NoNov 19, 2025
CVE-2025-65019MEDIUM5.4
  • JavaScriptJavaScript
  • astro
NoNov 19, 2025
CVE-2025-64757LOW3.5
  • JavaScriptJavaScript
  • astro
NoNov 19, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades