Description
Astro is a web framework. From version 2.10.10 to before version 5.18.1, this issue concerns Astro's remotePatterns path enforcement for remote URLs used by server-side fetchers such as the image optimization endpoint. The path matching logic for /* wildcards is unanchored, so a pathname that contains the allowed prefix later in the path can still match. As a result, an attacker can fetch paths outside the intended allowlisted prefix on an otherwise allowed host. This issue has been patched in version 5.18.1.
INFO
Published Date :
2026-03-24T18:44:29.169Z
Last Modified :
2026-03-24T20:13:25.845Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33769 vulnerability.
| Vendors | Products |
|---|---|
| Astro |
|
| Withastro |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33769.