Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27829: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro

0
Medium
VulnerabilityCVE-2026-27829cvecve-2026-27829cwe-918
Published: Thu Feb 26 2026 (02/26/2026, 00:36:40 UTC)
Source: CVE Database V5
Vendor/Project: withastro
Product: astro

Description

CVE-2026-27829 is a Server-Side Request Forgery (SSRF) vulnerability in the Astro web framework versions 9. 0. 0 through 9. 5. 3. The issue arises from the image pipeline's `inferSize` option, which fetches remote images at render time without validating the domain against configured restrictions (`image. domains` or `image. remotePatterns`). This allows attackers who can influence image URLs to make the server request arbitrary internal or external hosts, bypassing intended domain restrictions. Exploitation can lead to unauthorized internal network access or cloud metadata endpoint exposure.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:13:36 UTC

Technical Analysis

Astro is a modern web framework that includes an image pipeline feature designed to optimize image handling. In versions 9.0.0 through 9.5.3, a vulnerability exists in the `inferSize` option, which fetches remote images during server-side rendering to determine their dimensions. Normally, Astro restricts remote image fetching to domains explicitly authorized by developers via `image.domains` or `image.remotePatterns` configurations. However, when `inferSize` is enabled, this domain validation is bypassed, allowing the server to fetch images from any arbitrary host specified in the URL. This flaw constitutes a Server-Side Request Forgery (SSRF) vulnerability (CWE-918), enabling an attacker who can control or influence image URLs—such as through CMS content or user input—to induce the server to make unauthorized HTTP requests. These requests can target internal network services, cloud provider metadata endpoints, or other sensitive resources inaccessible from the outside. The vulnerability does not require authentication or user interaction, and the attack surface includes any Astro-powered site using affected versions with `inferSize` enabled. The CVSS 3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, no privileges or user interaction required, and impacts on integrity and availability but not confidentiality. The issue was addressed in Astro version 9.5.4 by enforcing domain validation during `inferSize` remote fetches. No public exploits have been reported yet, but the potential for internal network reconnaissance or cloud environment compromise makes this a significant risk for affected deployments.

Potential Impact

The primary impact of this SSRF vulnerability is that attackers can coerce vulnerable Astro servers into making unauthorized HTTP requests to arbitrary hosts, including internal network services and cloud metadata endpoints. This can lead to information disclosure, such as retrieval of sensitive internal data or cloud instance credentials, and potentially enable further attacks like lateral movement or privilege escalation within the internal network. The integrity of server operations may be affected if attackers manipulate responses or trigger unintended actions via these forged requests. Availability could also be impacted if the server is induced to make numerous or malicious requests, leading to resource exhaustion or denial of service. Organizations running Astro versions 9.0.0 to 9.5.3 with the `inferSize` option enabled are at risk, especially if user input or CMS content can influence image URLs. Given Astro's popularity in modern web development, the vulnerability could affect a wide range of websites globally, including corporate, governmental, and cloud-hosted applications. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the threat level. Although no known exploits are currently reported, the potential for serious internal network compromise and cloud environment exposure makes this a critical consideration for affected organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Astro to version 9.5.4 or later, where the issue is fixed by enforcing domain validation during `inferSize` remote image fetches. Until upgrading, it is advisable to disable the `inferSize` option entirely to prevent unauthorized remote fetches. Additionally, review and restrict the sources of image URLs, especially those influenced by user input or CMS content, to trusted domains only. Implement network-level controls such as egress filtering and firewall rules to limit the server's ability to make arbitrary outbound HTTP requests, particularly to internal IP ranges and cloud metadata endpoints (e.g., 169.254.169.254). Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to monitor and block suspicious request patterns. Conduct thorough code reviews and penetration testing focused on SSRF vectors in the image pipeline and related features. Finally, monitor logs for unusual outbound requests from the server that could indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.800Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f9a40b7ef31ef0b7260e7

Added to database: 2/26/2026, 12:56:32 AM

Last enriched: 2/26/2026, 1:13:36 AM

Last updated: 2/26/2026, 5:57:50 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats