Server-Side Request Forgery via /_image endpoint in Astro Cloudflare adapter
- Severity:
- High
Description
When using Astro’s Cloudflare adapter (@astrojs/cloudflare) configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn’t check the URLs it receives, allowing content from unauthorized third-party domains to be served.
Recommendation
Update the @astrojs/cloudflare package to the latest compatible version. Followings are version details:
- Affected version(s): >= 11.0.3, < 12.6.6
- Patched version(s): 12.6.6
References
Related Issues
- Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` - CVE-2025-65944
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-29mw-wpgm-hmr9) - CVE-2020-28500
- CKEditor 5 cross-site scripting (XSS) vulnerability in the clipboard package - CVE-2025-58064
- Payload's SQLite adapter Session Fixation vulnerability (GHSA-26rv-h2hf-3fw4) - CVE-2025-4644
- Tags:
- npm
- @astrojs/cloudflare
Anything's wrong? Let us know Last updated on September 05, 2025