Server-Side Request Forgery via /_image endpoint in Astro Cloudflare adapter
- Severity:
- High
Description
When using Astro’s Cloudflare adapter (@astrojs/cloudflare) configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn’t check the URLs it receives, allowing content from unauthorized third-party domains to be served.
Recommendation
Update the @astrojs/cloudflare package to the latest compatible version. Followings are version details:
- Affected version(s): >= 11.0.3, < 12.6.6
- Patched version(s): 12.6.6
References
Related Issues
- Parse Server is vulnerable to Server-Side Request Forgery (SSRF) via Instagram OAuth Adapter - CVE-2025-68150
- Parse Server Vulnerable to Server-Side Request Forgery (SSRF) in File Upload via URI Format - CVE-2025-64430
- Astro Cloudflare adapter has Stored Cross-site Scripting vulnerability in /_image endpoint - CVE-2025-65019
- Lobe Chat vulnerable to Server-Side Request Forgery with native web fetch module - CVE-2025-62505
- Tags:
- npm
- @astrojs/cloudflare
Anything's wrong? Let us know Last updated on September 05, 2025