Server-Side Request Forgery via /_image endpoint in Astro Cloudflare adapter
- Severity:
- High
Description
When using Astro’s Cloudflare adapter (@astrojs/cloudflare
) configured with output: 'server'
while using the default imageService: 'compile'
, the generated image optimization endpoint doesn’t check the URLs it receives, allowing content from unauthorized third-party domains to be served.
Recommendation
Update the @astrojs/cloudflare
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 11.0.3, < 12.6.6
- Patched version(s): 12.6.6
References
Related Issues
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-29mw-wpgm-hmr9) - CVE-2020-28500
- Payload's SQLite adapter Session Fixation vulnerability (GHSA-26rv-h2hf-3fw4) - CVE-2025-4644
- http-proxy-middleware can call writeBody twice because "else if" is not used - CVE-2025-32996
- rejetto HFS vulnerable to OS Command Execution by remote authenticated users - CVE-2024-39943
- Tags:
- npm
- @astrojs/cloudflare
Anything's wrong? Let us know Last updated on September 05, 2025