Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27829: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro

0
Medium
VulnerabilityCVE-2026-27829cvecve-2026-27829cwe-918
Published: Thu Feb 26 2026 (02/26/2026, 00:36:40 UTC)
Source: CVE Database V5
Vendor/Project: withastro
Product: astro

Description

Astro is a web framework. In versions 9.0.0 through 9.5.3, a bug in Astro's image pipeline allows bypassing `image.domains` / `image.remotePatterns` restrictions, enabling the server to fetch content from unauthorized remote hosts. Astro provides an `inferSize` option that fetches remote images at render time to determine their dimensions. Remote image fetches are intended to be restricted to domains the site developer has manually authorized (using the `image.domains` or `image.remotePatterns` options). However, when `inferSize` is used, no domain validation is performed — the image is fetched from any host regardless of the configured restrictions. An attacker who can influence the image URL (e.g., via CMS content or user-supplied data) can cause the server to fetch from arbitrary hosts. This allows bypassing `image.domains` / `image.remotePatterns` restrictions to make server-side requests to unauthorized hosts. This includes the risk of server-side request forgery (SSRF) against internal network services and cloud metadata endpoints. Version 9.5.4 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:14:19 UTC

Technical Analysis

Astro is a modern web framework that includes an image pipeline feature allowing developers to specify trusted domains for remote image fetching via `image.domains` or `image.remotePatterns`. This is intended to restrict server-side requests to authorized hosts only. However, in versions 9.0.0 through 9.5.3, the `inferSize` option, which automatically fetches remote images to determine their dimensions during rendering, does not enforce these domain restrictions. Consequently, if an attacker can influence the image URL—such as through user input or content management systems—they can cause the server to fetch images from arbitrary, unauthorized hosts. This Server-Side Request Forgery (SSRF) vulnerability (CWE-918) allows attackers to make the server perform HTTP requests to internal network resources or cloud provider metadata endpoints that are normally inaccessible externally. Such access can lead to information disclosure, including sensitive internal services or credentials. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The issue was publicly disclosed on February 26, 2026, and fixed in Astro version 9.5.4. No known exploits are currently reported in the wild.

Potential Impact

Organizations using vulnerable versions of the Astro framework (9.0.0 to 9.5.3) risk unauthorized internal network access via SSRF attacks. This can lead to exposure of sensitive internal services, cloud metadata endpoints (potentially leaking cloud credentials), and other protected resources. The SSRF can be leveraged to pivot attacks within the internal network, escalate privileges, or exfiltrate data. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by unauthenticated attackers if they can influence image URLs. This poses a significant risk to web applications relying on Astro for image processing, especially those integrated with internal APIs, cloud infrastructure, or sensitive backend services. The medium severity score reflects the moderate impact on integrity and availability, with no direct confidentiality impact unless combined with further exploitation. However, the potential for chained attacks increases the overall threat.

Mitigation Recommendations

Upgrade all Astro framework instances to version 9.5.4 or later, where the SSRF vulnerability is fixed by enforcing domain validation during `inferSize` image fetches. Until upgrading, as a temporary mitigation, disable the `inferSize` option if it is not essential, preventing automatic remote image fetching. Additionally, implement strict input validation and sanitization on any user-controllable image URLs to prevent injection of arbitrary hosts. Employ network-level controls such as egress filtering and firewall rules to restrict server outbound HTTP requests to only trusted domains and IP ranges. Monitor application logs for unusual outbound requests to internal or unexpected external hosts. Conduct security reviews of CMS or user input mechanisms that influence image URLs to reduce attack surface. Finally, maintain up-to-date threat intelligence and patch management processes to respond promptly to similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.800Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f9a40b7ef31ef0b7260e7

Added to database: 2/26/2026, 12:56:32 AM

Last enriched: 3/5/2026, 11:14:19 AM

Last updated: 4/11/2026, 10:48:09 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses