
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-64745 is a vulnerability in Astro's development server error pages when the trailingSlash configuration option is used. The vulnerability was discovered in November 2025 and affects Astro versions >= 5.2.0, with a patch available in version 5.15.6 (GHSA Advisory).
The vulnerability is a Reflected Cross-Site Scripting (XSS) issue located in astro/packages/astro/src/template/4xx.ts. The root cause stems from the corrected variable, derived from the user-controlled pathname parameter, being directly interpolated into the HTML without proper escaping. While the pathname variable is escaped elsewhere, the corrected variable remains unsanitized before insertion into both the href attribute and link text (GHSA Advisory).
An attacker can inject arbitrary JavaScript code that executes in the victim's browser context by crafting a malicious URL. While this vulnerability only affects the development server and not production builds, it could be exploited to compromise developer environments through social engineering or malicious links (GHSA Advisory).
The vulnerability has been patched in Astro version 5.15.6. Users are advised to upgrade to this version or later to mitigate the risk. The fix involves proper escaping of the corrected variable before its insertion into the HTML template (GHSA Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."