Vulnerability Description
Astro is a web framework. Starting in version 5.2.0 and prior to version 5.15.6, a Reflected Cross-Site Scripting (XSS) vulnerability exists in Astro's development server error pages when the `trailingSlash` configuration option is used. An attacker can inject arbitrary JavaScript code that executes in the victim's browser context by crafting a malicious URL. While this vulnerability only affects the development server and not production builds, it could be exploited to compromise developer environments through social engineering or malicious links. Version 5.15.6 fixes the issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Astro | Astro | >= 5.2.0, < 5.15.6 |
Related Weaknesses (CWE)
References
- https://github.com/withastro/astro/blob/5bc37fd5cade62f753aef66efdf40f982379029aProduct
- https://github.com/withastro/astro/commit/790d9425f39bbbb462f1c27615781cd965009fPatch
- https://github.com/withastro/astro/pull/12994Patch
- https://github.com/withastro/astro/security/advisories/GHSA-w2vj-39qv-7vh7ExploitThird Party Advisory
FAQ
What is CVE-2025-64745?
CVE-2025-64745 is a vulnerability with a CVSS score of 2.7 (LOW). Astro is a web framework. Starting in version 5.2.0 and prior to version 5.15.6, a Reflected Cross-Site Scripting (XSS) vulnerability exists in Astro's development server error pages when the `trailin...
How severe is CVE-2025-64745?
CVE-2025-64745 has been rated LOW with a CVSS base score of 2.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-64745?
Check the references section above for vendor advisories and patch information. Affected products include: Astro Astro.