CVE-2025-64757
JavaScript vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2025-64757) has been identified in the Astro framework's development server that allows arbitrary local file read access through the image optimization endpoint. The vulnerability was discovered in November 2025 and affects Astro development environments running versions < 5.14.3. This security flaw enables remote attackers to read any image file accessible to the Node.js process on the host system (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-23 (Relative Path Traversal). It exists in the Node.js image endpoint handler used during development mode, specifically in the /packages/astro/src/assets/endpoint/node.ts component. The vulnerability has a CVSS v3.1 base score of 3.5 (Low severity) with the vector string CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N. The development branch bypasses the security checks that exist in the production code path, which normally validates that file paths are within the allowed assets directory (GitHub Advisory).

Impact

The vulnerability has a HIGH confidentiality impact, allowing attackers to read any image file accessible to the Node.js process via HTTP response. While the vulnerability does not affect system integrity or availability directly, it could potentially be used for resource exhaustion through repeated large image requests. The scope is limited to the local development environment (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Astro version 5.14.3 and later. Users are advised to upgrade to the patched version to prevent potential exploitation. The production environment is not affected as it implements proper path validation (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65099HIGH7.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesNov 19, 2025
CVE-2025-64764HIGH7.1
  • JavaScriptJavaScript
  • astro
NoYesNov 19, 2025
CVE-2025-64765MEDIUM6.9
  • JavaScriptJavaScript
  • astro
NoYesNov 19, 2025
CVE-2025-65019MEDIUM5.4
  • JavaScriptJavaScript
  • astro
NoYesNov 19, 2025
CVE-2025-64757LOW3.5
  • JavaScriptJavaScript
  • astro
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management