Skip to main content

CVE-2025-54793: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in withastro astro

Medium
VulnerabilityCVE-2025-54793cvecve-2025-54793cwe-601
Published: Fri Aug 08 2025 (08/08/2025, 00:02:38 UTC)
Source: CVE Database V5
Vendor/Project: withastro
Product: astro

Description

Astro is a web framework for content-driven websites. In versions 5.2.0 through 5.12.7, there is an Open Redirect vulnerability in the trailing slash redirection logic when handling paths with double slashes. This allows an attacker to redirect users to arbitrary external domains by crafting URLs such as https://mydomain.com//malicious-site.com/. This increases the risk of phishing and other social engineering attacks. This affects sites that use on-demand rendering (SSR) with the Node or Cloudflare adapters. It does not affect static sites, or sites deployed to Netlify or Vercel. This issue is fixed in version 5.12.8. To work around this issue at the network level, block outgoing redirect responses with a Location header value that starts with `//`.

AI-Powered Analysis

AILast updated: 08/08/2025, 01:03:35 UTC

Technical Analysis

CVE-2025-54793 is an Open Redirect vulnerability (CWE-601) affecting the Astro web framework versions 5.2.0 through 5.12.7. Astro is a modern framework used for building content-driven websites, supporting server-side rendering (SSR) via Node or Cloudflare adapters. The vulnerability arises from the trailing slash redirection logic when handling URL paths containing double slashes. Specifically, if an attacker crafts a URL with a double slash followed by an external domain (e.g., https://mydomain.com//malicious-site.com/), the application improperly redirects users to the external, potentially malicious domain. This flaw does not affect static site deployments or those hosted on Netlify or Vercel, as these platforms do not utilize the vulnerable SSR adapters. The vulnerability has a CVSS 4.0 base score of 5.5 (medium severity), reflecting its network exploitable nature without requiring authentication or user interaction. The impact primarily involves enabling phishing and social engineering attacks by leveraging trusted domains to redirect users to malicious sites. No known exploits are currently reported in the wild. The issue is resolved in Astro version 5.12.8. As a network-level mitigation, blocking HTTP redirect responses with Location headers starting with double slashes (//) can prevent exploitation.

Potential Impact

For European organizations using Astro with SSR on Node or Cloudflare adapters, this vulnerability poses a risk of facilitating phishing and social engineering attacks. Attackers can exploit the open redirect to craft URLs that appear to originate from legitimate, trusted domains, increasing the likelihood of users being deceived into visiting malicious sites. This can lead to credential theft, malware infections, or further compromise of enterprise systems. The vulnerability does not directly compromise system confidentiality, integrity, or availability but serves as an enabler for downstream attacks. Organizations relying on Astro for customer-facing websites or internal portals may see reputational damage and user trust erosion if exploited. Given the medium severity and ease of exploitation without authentication, the threat is significant, especially for sectors with high user interaction such as e-commerce, finance, and public services in Europe.

Mitigation Recommendations

1. Upgrade all affected Astro instances to version 5.12.8 or later immediately to apply the official fix. 2. For environments where immediate upgrade is not feasible, implement network-level controls to block HTTP redirect responses containing Location headers that start with double slashes (//), as these indicate the malicious redirect pattern. 3. Review and sanitize URL handling logic in custom middleware or routing configurations to ensure no unintended redirects to external domains occur. 4. Employ web application firewalls (WAFs) with rules to detect and block open redirect attempts based on suspicious Location header patterns. 5. Educate users and administrators about the risks of phishing via trusted domains and encourage vigilance when clicking on URLs, especially those with unusual path structures. 6. Monitor web server logs for unusual redirect patterns or spikes in 3xx responses with suspicious Location headers to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-29T16:50:28.394Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6895495bad5a09ad00fe8c5d

Added to database: 8/8/2025, 12:48:27 AM

Last enriched: 8/8/2025, 1:03:35 AM

Last updated: 8/8/2025, 5:02:48 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats