Description

Astro is a web framework. Prior to 6.1.6, the defineScriptVars function in Astro's server-side rendering pipeline uses a case-sensitive regex /<\/script>/g to sanitize values injected into inline <script> tags via the define:vars directive. HTML parsers close <script> elements case-insensitively and also accept whitespace or / before the closing >, allowing an attacker to bypass the sanitization with payloads like </Script>, </script >, or </script/> and inject arbitrary HTML/JavaScript. This vulnerability is fixed in 6.1.6.

INFO

Published Date :

2026-04-24T16:57:22.940Z

Last Modified :

2026-04-24T18:16:55.536Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-41067 vulnerability.

Vendors Products
Astro
  • Astro
Withastro
  • Astro
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-41067.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact