Description

Astro is a web framework. Versions 5.15.7 and below have a double URL encoding bypass which allows any unauthenticated attacker to bypass path-based authentication checks in Astro middleware, granting unauthorized access to protected routes. While the original CVE-2025-64765 was fixed in v5.15.8, the fix is insufficient as it only decodes once. By using double-encoded URLs, attackers can still bypass authentication and access any route protected by middleware pathname checks. This issue is fixed in version 5.15.8.

INFO

Published Date :

2025-12-08T23:41:21.976Z

Last Modified :

2025-12-09T16:04:07.923Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-66202 vulnerability.

Vendors Products
Astro
  • Astro
Withastro
  • Astro

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact