CVE-2025-61925
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-61925 affects Astro web framework versions prior to 5.14.2. The vulnerability was discovered and disclosed on October 10, 2025, and involves the improper validation of the X-Forwarded-Host header value when using Astro.url. This security issue affects applications using Astro in on-demand/dynamic rendering mode behind a caching proxy (GitHub Advisory).

Technical details

The vulnerability stems from Astro reflecting the value in X-Forwarded-Host in output when using Astro.url without proper validation. When web servers like nginx route requests via the Host header and forward other request headers, a malicious request can be sent containing both a Host header and an X-Forwarded-Host header with mismatched values, where the X-Forwarded-Host header contains malicious content. The vulnerability has been assigned a CVSS v3.1 score of 6.5 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L (GitHub Advisory).

Impact

The vulnerability can lead to manipulation of any code using the Astro.url value. For example, canonical links can be manipulated to point to malicious sites, and login/registration form URLs could potentially redirect credentials to unauthorized parties. While initially affecting only the malicious user's request, when used with a caching proxy, the manipulated values can be persisted and served to subsequent users, expanding the attack surface (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Astro version 5.14.2. Users should upgrade to this version or later to mitigate the risk. Other frameworks typically implement an allowlist of domains for validation or avoid header reflection entirely to prevent such issues (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-365g-vjw2-grx8HIGH8.8
  • JavaScriptJavaScript
  • n8n
NoNoOct 09, 2025
GHSA-j44m-5v8f-gc9cHIGH7.7
  • JavaScriptJavaScript
  • flowise
NoYesOct 10, 2025
CVE-2025-11569HIGH7.7
  • JavaScriptJavaScript
  • cross-zip
NoNoOct 10, 2025
CVE-2025-61927HIGH7.2
  • JavaScriptJavaScript
  • happy-dom
NoYesOct 10, 2025
CVE-2025-61925MEDIUM6.5
  • JavaScriptJavaScript
  • astro
NoYesOct 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management