Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27729: CWE-770: Allocation of Resources Without Limits or Throttling in withastro astro

0
Medium
VulnerabilityCVE-2026-27729cvecve-2026-27729cwe-770
Published: Tue Feb 24 2026 (02/24/2026, 00:46:15 UTC)
Source: CVE Database V5
Vendor/Project: withastro
Product: astro

Description

CVE-2026-27729 is a medium severity denial-of-service vulnerability in the Astro web framework versions 9. 0. 0 through 9. 5. 3. The issue arises because Astro server actions do not impose any default limit on the size of incoming request bodies, allowing an attacker to send a single oversized POST request that exhausts server memory and crashes the process. This vulnerability affects standalone SSR deployments using Astro's Node adapter, where the server buffers the entire request body in memory without size restrictions. No authentication or user interaction is required, as action endpoints are discoverable from public HTML forms. In containerized environments, repeated exploitation causes a crash-restart loop, resulting in persistent denial of service. The vulnerability is fixed in version 9.

AI-Powered Analysis

AILast updated: 02/24/2026, 01:32:24 UTC

Technical Analysis

Astro is a modern web framework that supports server-side rendering (SSR) and server actions, which automatically parse incoming request bodies (JSON or FormData) by buffering them entirely into memory. Versions 9.0.0 through 9.5.3 of Astro contain a vulnerability (CVE-2026-27729) where no default size limit is imposed on these request bodies. This lack of throttling or resource allocation limits (CWE-770) allows an attacker to send a single large POST request to a valid server action endpoint, causing memory exhaustion and crashing the server process. The vulnerability is particularly impactful in deployments using Astro's Node adapter in standalone mode, which creates an HTTP server without any built-in body size protection. Since server action names are discoverable from HTML form attributes on public pages, attackers can identify valid endpoints without authentication. In containerized environments, the server process automatically restarts after a crash, but repeated oversized requests cause a persistent crash-restart loop, effectively denying service. The vulnerability does not affect confidentiality or integrity but severely impacts availability. The issue was addressed in Astro version 9.5.4 by introducing request body size limits or other resource throttling mechanisms. No known exploits are reported in the wild as of the publication date.

Potential Impact

This vulnerability can cause denial of service by crashing the server process handling SSR requests, leading to downtime and degraded user experience. Organizations running Astro-based SSR applications, especially in containerized or memory-constrained environments, risk persistent service interruptions due to crash-restart loops triggered by oversized POST requests. The attack requires no authentication and can be launched remotely over the network, increasing its risk profile. While it does not compromise data confidentiality or integrity, the availability impact can disrupt business operations, customer access, and potentially damage reputation. The ease of discovering valid server action endpoints from public pages lowers the barrier for attackers. Enterprises relying on Astro for critical web services or high-traffic sites may face operational instability and increased incident response costs until patched.

Mitigation Recommendations

Upgrade all affected Astro deployments to version 9.5.4 or later, which includes fixes that impose request body size limits and prevent memory exhaustion. If immediate upgrade is not feasible, implement reverse proxy or web application firewall (WAF) rules to restrict the maximum allowed request body size for POST requests targeting server action endpoints. Monitor server logs for repeated large POST requests and implement rate limiting to reduce the risk of crash-restart loops. In containerized environments, configure health checks and restart policies to avoid rapid crash loops that degrade service availability. Additionally, consider obfuscating or restricting access to server action endpoints to reduce their discoverability from public HTML forms. Conduct regular security testing and monitoring to detect anomalous request patterns indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T18:37:14.789Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699cfc3cbe58cf853bfd2f51

Added to database: 2/24/2026, 1:17:48 AM

Last enriched: 2/24/2026, 1:32:24 AM

Last updated: 2/24/2026, 6:05:23 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats