Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33768— Astro: Unauthenticated Path Override via `x-astro-path` / `x_astro_path`

CVSS 6.5 · Medium EPSS 0.06% · P20
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33768

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Astro: Unauthenticated Path Override via `x-astro-path` / `x_astro_path`
Source: NVD (National Vulnerability Database)
Vulnerability Description
Astro is a web framework. Prior to version 10.0.2, the @astrojs/vercel serverless entrypoint reads the x-astro-path header and x_astro_path query parameter to rewrite the internal request path, with no authentication whatsoever. On deployments without Edge Middleware, this lets anyone bypass Vercel's platform-level path restrictions entirely. The override preserves the original HTTP method and body, so this isn't limited to GET. POST, PUT, DELETE all land on the rewritten path. A Firewall rule blocking /admin/* does nothing when the request comes in as POST /api/health?x_astro_path=/admin/delete-user. This issue has been patched in version 10.0.2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
未有动机的代理或中间人(混淆代理)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Astro 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Astro是Astro开源的一个内容驱动网站的 web 框架。 Astro 10.0.2之前版本存在安全漏洞,该漏洞源于读取x-astro-path标头和x_astro_path查询参数时缺少身份验证,可能导致绕过路径限制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
withastroastro < 10.0.2 -

II. Public POCs for CVE-2026-33768

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-33768

登录查看更多情报信息。

Same Patch Batch · withastro · 2026-03-24 · 3 CVEs total

CVE-2026-297725.9 MEDIUMAstro: Memory exhaustion DoS due to missing request body size limit in Server Islands
CVE-2026-33769Astro: Remote allowlist bypass via unanchored matchPathname wildcard

IV. Related Vulnerabilities

V. Comments for CVE-2026-33768

No comments yet


Leave a comment