CVE-2026-33768
MEDIUM
6,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: none
Description
AI Translation Available
Astro is a web framework. Prior to version 10.0.2, the @astrojs/vercel serverless entrypoint reads the x-astro-path header and x_astro_path query parameter to rewrite the internal request path, with no authentication whatsoever. On deployments without Edge Middleware, this lets anyone bypass Vercel's platform-level path restrictions entirely. The override preserves the original HTTP method and body, so this isn't limited to GET. POST, PUT, DELETE all land on the rewritten path. A Firewall rule blocking /admin/* does nothing when the request comes in as POST /api/health?x_astro_path=/admin/delete-user. This issue has been patched in version 10.0.2.
441
Unintended Proxy or Intermediary ('Confused Deputy')
DraftCommon Consequences
Security Scopes Affected:
Non-Repudiation
Access Control
Potential Impacts:
Gain Privileges Or Assume Identity
Hide Activities
Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
862
Missing Authorization
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Access Control
Availability
Potential Impacts:
Read Application Data
Read Files Or Directories
Modify Application Data
Modify Files Or Directories
Gain Privileges Or Assume Identity
Bypass Protection Mechanism
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Other)
Applicable Platforms
Technologies:
AI/ML, Database Server, Not Technology-Specific, Web Server
https://github.com/withastro/astro/commit/335a204161f5a7293c128db570901d4f8639c…
https://github.com/withastro/astro/pull/15959
https://github.com/withastro/astro/releases/tag/%40astrojs%2Fvercel%4010.0.2
https://github.com/withastro/astro/security/advisories/GHSA-mr6q-rp88-fx84