Intel

AIKIDO-2025-10879

astro is vulnerable to Authentication Bypass Using an Alternate Path or Channel

Authentication Bypass Using an Alternate Path or Channel Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

80

High Risk

This Affects:

JSastro
3.5.6 - 5.16.2
Fixed in 5.16.3

TL;DR

Affected versions of this package are vulnerable to authentication bypass through double-URL encoded paths. An attacker could use multi-level URL encoding (e.g. /%2561dmin) to access routes that should be behind authentication. The patch fixes this by decoding pathnames and rejecting requests that contain leftover percent-encoded sequences after decoding.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

astro is vulnerable to Authentication Bypass Using an Alternate Path or Channel in versions 3.5.6 - 5.16.2.

How to fix this

Upgrade the astro library to the patch version.