CVE-2026-29772: CWE-770: Allocation of Resources Without Limits or Throttling in withastro astro
CVE-2026-29772 is a medium-severity vulnerability in the Astro web framework versions prior to 10. 0. 0. The issue arises from the Server Islands POST handler, which parses the entire request body as JSON without enforcing any size limits. This allows an attacker to send a crafted payload containing many small JSON objects, causing approximately 15 times memory amplification in the V8 JavaScript engine heap. As a result, a single unauthenticated request can exhaust the server's memory and crash the process, leading to denial of service. The vulnerable endpoint is /_server-islands/[name], which is registered on all Astro SSR apps using the Node standalone adapter, regardless of component usage. The vulnerability has been patched in Astro version 10. 0. 0.
AI Analysis
Technical Summary
Astro is a modern web framework that supports server-side rendering (SSR) with a feature called Server Islands. Prior to version 10.0.0, the Server Islands POST handler accepts requests on the route /_server-islands/[name] and buffers the entire request body, parsing it as JSON without imposing any size restrictions. The parsing uses JSON.parse(), which in the V8 JavaScript engine allocates heap objects for every element in the input JSON. An attacker can exploit this by crafting a payload consisting of numerous small JSON objects, which leads to a significant memory amplification effect—approximately 15 times the size of the wire data is consumed in heap memory. This uncontrolled memory allocation can exhaust the Node.js process heap, causing the server to crash and resulting in a denial of service condition. The vulnerability is unauthenticated and does not require user interaction. The route is registered on all Astro SSR applications using the Node standalone adapter, even if no components use server:defer, and the request body is parsed before validating the island name, broadening the attack surface. This vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling). It has been addressed in Astro version 10.0.0 by implementing size limits or throttling on the request body parsing. The CVSS v3.1 score is 5.9 (medium), reflecting the network attack vector, no privileges required, no user interaction, and impact limited to availability (denial of service). No known exploits have been reported in the wild as of the publication date.
Potential Impact
The primary impact of this vulnerability is denial of service (DoS) through memory exhaustion. Organizations running Astro SSR applications with the Node standalone adapter on versions prior to 10.0.0 are at risk of having their web servers crash due to a single unauthenticated request. This can lead to service outages, degraded user experience, and potential loss of revenue or reputation. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, the disruption of service can be critical for high-availability environments, especially those relying on Astro for public-facing websites or APIs. The ease of exploitation (no authentication or user interaction required) increases the risk of automated attacks or scanning by malicious actors. Organizations with large-scale deployments or those exposed directly to the internet are particularly vulnerable. The lack of current known exploits suggests limited active exploitation, but the vulnerability’s characteristics make it a likely target once widely known.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all Astro SSR applications using the Node standalone adapter to version 10.0.0 or later, where the issue is patched. If immediate upgrade is not feasible, implement network-level protections such as rate limiting and request size restrictions on the /_server-islands/[name] endpoint to prevent large or excessive POST requests. Employ Web Application Firewalls (WAFs) capable of detecting and blocking anomalous JSON payloads or unusually large request bodies. Monitor server memory usage and set process-level memory limits to detect and mitigate potential exhaustion attempts. Additionally, consider isolating Astro SSR services behind reverse proxies that can enforce stricter request validation and size limits. Regularly audit and update dependencies to ensure timely application of security patches. Finally, implement logging and alerting for unusual spikes in request sizes or server crashes to enable rapid incident response.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-29772: CWE-770: Allocation of Resources Without Limits or Throttling in withastro astro
Description
CVE-2026-29772 is a medium-severity vulnerability in the Astro web framework versions prior to 10. 0. 0. The issue arises from the Server Islands POST handler, which parses the entire request body as JSON without enforcing any size limits. This allows an attacker to send a crafted payload containing many small JSON objects, causing approximately 15 times memory amplification in the V8 JavaScript engine heap. As a result, a single unauthenticated request can exhaust the server's memory and crash the process, leading to denial of service. The vulnerable endpoint is /_server-islands/[name], which is registered on all Astro SSR apps using the Node standalone adapter, regardless of component usage. The vulnerability has been patched in Astro version 10. 0. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Astro is a modern web framework that supports server-side rendering (SSR) with a feature called Server Islands. Prior to version 10.0.0, the Server Islands POST handler accepts requests on the route /_server-islands/[name] and buffers the entire request body, parsing it as JSON without imposing any size restrictions. The parsing uses JSON.parse(), which in the V8 JavaScript engine allocates heap objects for every element in the input JSON. An attacker can exploit this by crafting a payload consisting of numerous small JSON objects, which leads to a significant memory amplification effect—approximately 15 times the size of the wire data is consumed in heap memory. This uncontrolled memory allocation can exhaust the Node.js process heap, causing the server to crash and resulting in a denial of service condition. The vulnerability is unauthenticated and does not require user interaction. The route is registered on all Astro SSR applications using the Node standalone adapter, even if no components use server:defer, and the request body is parsed before validating the island name, broadening the attack surface. This vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling). It has been addressed in Astro version 10.0.0 by implementing size limits or throttling on the request body parsing. The CVSS v3.1 score is 5.9 (medium), reflecting the network attack vector, no privileges required, no user interaction, and impact limited to availability (denial of service). No known exploits have been reported in the wild as of the publication date.
Potential Impact
The primary impact of this vulnerability is denial of service (DoS) through memory exhaustion. Organizations running Astro SSR applications with the Node standalone adapter on versions prior to 10.0.0 are at risk of having their web servers crash due to a single unauthenticated request. This can lead to service outages, degraded user experience, and potential loss of revenue or reputation. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, the disruption of service can be critical for high-availability environments, especially those relying on Astro for public-facing websites or APIs. The ease of exploitation (no authentication or user interaction required) increases the risk of automated attacks or scanning by malicious actors. Organizations with large-scale deployments or those exposed directly to the internet are particularly vulnerable. The lack of current known exploits suggests limited active exploitation, but the vulnerability’s characteristics make it a likely target once widely known.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all Astro SSR applications using the Node standalone adapter to version 10.0.0 or later, where the issue is patched. If immediate upgrade is not feasible, implement network-level protections such as rate limiting and request size restrictions on the /_server-islands/[name] endpoint to prevent large or excessive POST requests. Employ Web Application Firewalls (WAFs) capable of detecting and blocking anomalous JSON payloads or unusually large request bodies. Monitor server memory usage and set process-level memory limits to detect and mitigate potential exhaustion attempts. Additionally, consider isolating Astro SSR services behind reverse proxies that can enforce stricter request validation and size limits. Regularly audit and update dependencies to ensure timely application of security patches. Finally, implement logging and alerting for unusual spikes in request sizes or server crashes to enable rapid incident response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T16:26:02.897Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2dfdbf4197a8e3b622b30
Added to database: 3/24/2026, 7:02:51 PM
Last enriched: 3/31/2026, 8:32:51 PM
Last updated: 5/7/2026, 4:12:06 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.