CrowdSec
3/10CrowdSec Score

Astro - XSS (CVE-2025-64764)

Published on19-11-2025
First seen on15-12-2025
Public ExploitCVSS 7.1/10Withastro - Astro

2Exploiting IPs reported

Astro is a web framework. Prior to version 5.15.8, a reflected XSS vulnerability is present when the server islands feature is used in the targeted application, regardless of what was intended by the component template(s). This issue has been patched in version 5.15.8.

CrowdSec analysis

CVE-2025-64764 is a reflected cross-site scripting (XSS) vulnerability in the Astro web framework, specifically affecting applications using the server islands feature prior to version 5.15.8. This flaw could allow remote attackers to inject and execute malicious scripts in the context of a user's browser, potentially leading to session hijacking or unauthorized actions on behalf of the user.

CrowdSec has been tracking this vulnerability and its exploits since 10th of December 2025.

CrowdSec network data shows that most actors exploiting CVE-2025-64764 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. Data from the CrowdSec community also indicates a gradual decrease in attacks targeting CVE-2025-64764. While still present in the wild, exploitation levels have dropped noticeably week-over-week. This may signal that the vulnerability is becoming less relevant or that defenses are improving fast enough for attackers to lose interest.

Attackers exploit the Astro server islands feature by sending crafted requests to URLs containing /_server-islands/ with malicious query parameters, resulting in reflected XSS payloads being executed in users' browsers.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.