### [CVE-2025-55303](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55303) ![](https://img.shields.io/static/v1?label=Product&message=astro&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%204.16.18%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%205.0.0-alpha.0%2C%20%3C%205.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-115%3A%20Misinterpretation%20of%20Input&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brightgreen) ### Description Astro is a web framework for content-driven websites. In versions of astro before 5.13.2 and 4.16.18, the image optimization endpoint in projects deployed with on-demand rendering allows images from unauthorized third-party domains to be served. On-demand rendered sites built with Astro include an /_image endpoint which returns optimized versions of images. A bug in impacted versions of astro allows an attacker to bypass the third-party domain restrictions by using a protocol-relative URL as the image source, e.g. /_image?href=//example.com/image.png. This vulnerability is fixed in 5.13.2 and 4.16.18. ### POC #### Reference - https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds