chore(deps): update dependency @astrojs/vercel to v10 [security]#385
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update dependency @astrojs/vercel to v10 [security]#385renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^8.0.0→^10.0.0GitHub Vulnerability Alerts
CVE-2026-33768
Summary
The
@astrojs/vercelserverless entrypoint reads thex-astro-pathheader andx_astro_pathquery parameter to rewrite the internal request path, with no authentication whatsoever. On deployments without Edge Middleware, this lets anyone bypass Vercel's platform-level path restrictions entirely.The override preserves the original HTTP method and body, so this isn't limited to GET. POST, PUT, DELETE all land on the rewritten path. A Firewall rule blocking
/admin/*does nothing when the request comes in asPOST /api/health?x_astro_path=/admin/delete-user.Affected Versions
Verified against:
duplexbug in the Request constructor (theduplex: 'half'option is required when passing a ReadableStream body — this has been an issue since Node.js 18 but is consistently enforced in the Node.js 22+ runtime that Astro 6 requires). This is not a security fix — the code explicitly passesbody: request.bodyand intends to preserve it. Once the missingduplexoption is added, all methods will be exploitable on v6 as well.The vulnerable code path is identical across both versions.
Affected Component
@astrojs/vercelpackages/integrations/vercel/src/serverless/entrypoint.ts(lines 19–28)packages/integrations/vercel/src/index.ts(lines 44–45)Vulnerable Code
The handler blindly trusts the caller-supplied path:
What makes this worse is the inconsistency.
x-astro-localsright below it is gated behindmiddlewareSecret, butx-astro-pathgets nothing:Conditions
@astrojs/verceladapteroutput: 'server'(SSR)src/middleware.tsdefined, or middleware not using Edge modeThis is a realistic production configuration. Middleware is optional and many deployments skip it.
The
x-astro-pathmechanism exists for a legitimate purpose: when Edge Middleware is present, it forwards requests to a single serverless function (_render) and uses this header to communicate the original path. The Edge Middleware always overwrites any client-supplied value with the correct one. But when no Edge Middleware is configured, requests hit the serverless function directly, and the override is exposed to external callers with no protection.Proof of Concept
Setup: minimal Astro SSR project on Vercel, no middleware. Routes:
/public(page),/api/health(API endpoint),/admin/secret(page),/admin/delete-user(API endpoint). Vercel Firewall blocks/admin/*.GET — page content override:
GET — API route override:
Header override:
Vercel Firewall bypass (GET):
Vercel Firewall bypass (POST) — verified on Astro 5.x:
The Firewall evaluates the original path. The serverless function serves the overridden path. Method and body carry over.
ISR is not affected. Vercel's cache layer appears to intercept before the function runs.
Impact
Firewall/WAF bypass — read (Critical): Any path-based restriction in Vercel Dashboard or
vercel.json(IP blocks, geo restrictions, rate limits scoped to specific paths) can be bypassed for GET requests. Protected page content and API responses are fully readable.Firewall/WAF bypass — write (Critical): POST/PUT/DELETE requests also bypass Firewall rules. The method and body are preserved through the override, so any write endpoint behind path-based restrictions is reachable. Verified on Astro 5.x; on 6.x this is blocked by an unrelated
duplexbug in the Request constructor, not by any security check.Audit log mismatch (Medium): Vercel logs record the original request path and query string (e.g.
/public?x_astro_path=/admin/secret), so the override parameter is technically visible. However, the logged path (/public) does not reflect the path actually served (/admin/secret). Detecting this attack from logs requires knowing whatx_astro_pathmeans — standard monitoring and alerting based on request paths will not catch it.Prior Art
CVE-2025-29927 (Next.js):
x-middleware-subrequestheader injectable by external clients, bypassing middleware. Same class of vulnerability.Release Notes
withastro/astro (@astrojs/vercel)
v10.0.2Compare Source
Patch Changes
335a204Thanks @matthewp! - Fix Vercel serverless path override handling so override values are only applied when the trusted middleware secret is present.v10.0.1Compare Source
Patch Changes
6f8f0bcThanks @ematipico! - Updates the AstropeerDependencies#astroto be6.0.0.v10.0.0Compare Source
Major Changes
736216bThanks @florian-lefebvre! - Removes the deprecated@astrojs/vercel/serverlessand@astrojs/vercel/staticexports. Use the@astrojs/vercelexport insteadMinor Changes
#15258
d339a18Thanks @ematipico! - Stabilizes the adapter featureexperimentalStatiHeaders. If you were using this feature in any of the supported adapters, you'll need to change the name of the flag:export default defineConfig({ adapter: netlify({ - experimentalStaticHeaders: true + staticHeaders: true }) })#15413
736216bThanks @florian-lefebvre! - Updates the implementation to use the new Adapter API#15495
5b99e90Thanks @leekeh! - Adds newmiddlewareModeadapter feature and deprecatesedgeMiddlewareoptionThe
edgeMiddlewareoption is now deprecated and will be removed in a future release, so users should transition to using the newmiddlewareModefeature as soon as possible.export default defineConfig({ adapter: vercel({ - edgeMiddleware: true + middlewareMode: 'edge' }) })#14946
95c40f7Thanks @ematipico! - Removes theexperimental.cspflag and replaces it with a new configuration optionsecurity.csp- (v6 upgrade guidance)Patch Changes
#15781
2de969dThanks @ematipico! - Adds a newclientAddressoption to thecreateContext()functionProviding this value gives adapter and middleware authors explicit control over the client IP address. When not provided, accessing
clientAddressthrows an error consistent with other contexts where it is not set by the adapter.Additionally, both of the official Netlify and Vercel adapters have been updated to provide this information in their edge middleware.
#15778
4ebc1e3Thanks @ematipico! - Fixes an issue where the computedclientAddresswas incorrect in cases of a Request header with multiple values. TheclientAddressis now also validated to contain only characters valid in IP addresses, rejecting injection payloads.#15460
ee7e53fThanks @florian-lefebvre! - Updates to use the new Adapter API#15450
50c9129Thanks @florian-lefebvre! - Fixes a case wherebuild.serverEntrywould not be respected when using the new Adapter API#15461
9f21b24Thanks @florian-lefebvre! - Updates to new Adapter API introduced in v6#15125
6feb0d7Thanks @florian-lefebvre! - Updates Node versions data to account for v24 as the defaultUpdated dependencies [
4ebc1e3,4e7f3e8,a164c77,cf6ea6b,a18d727,240c317,745e632]:v9.0.5Compare Source
Patch Changes
c2cd371]:v9.0.4Compare Source
Patch Changes
29fd188Thanks @drwpow! - Improves error message when using Node builtins inside Edge middlewaresv9.0.3Compare Source
Patch Changes
9fc4562Thanks @Raanelom! - Updates Node versions data to account for v24 as the defaultv9.0.2Compare Source
Patch Changes
9a284cdThanks @drwpow! - fix: Allow "node:" prefix for Node builtinsv9.0.1Patch Changes
9e9c528,0f75f6b]:v9.0.0Major Changes
5601357Thanks @jacobdalamb! - Updates Node v18 'retiring' notice to 'deprecated' for Vercel adapter.Minor Changes
#14543
9b3241dThanks @matthewp! - Enables skew protection for Astro sites deployed on Vercel. Skew protection ensures that your site's client and server versions stay synchronized during deployments, preventing issues where users might load assets from a newer deployment while the server is still running the older version.Skew protection is automatically enabled on Vercel deployments when the
VERCEL_SKEW_PROTECTION_ENABLEDenvironment variable is set to1. The deployment ID is automatically included in both asset requests and API calls, allowing Vercel to serve the correct version to every user.v8.2.11Compare Source
Patch Changes
#14570
c96711dThanks @matthewp! - Fix regression in 8.2.7: validate densities-based srcset widths against configured sizesWhen using
densitieswith the Vercel image adapter, calculated widths were not being validated against Vercel's configured sizes list. This caused images to fail when using densities, as Vercel would reject the invalid widths.This fix ensures densities-calculated widths are mapped to valid configured sizes, matching the behavior already implemented for the
widthsprop.v8.2.10Compare Source
Patch Changes
9261996Thanks @florian-lefebvre! - Fixes a bug that caused too many files to be bundled in SSRv8.2.9Compare Source
Patch Changes
#14473
d9634d3Thanks @florian-lefebvre! - Fixes a bug that caused too many files to be bundled in SSRUpdated dependencies [
b8ca69b]:v8.2.8Compare Source
Patch Changes
1e2499e]:v8.2.7Compare Source
Patch Changes
#14039
da4182dThanks @ematipico! - Fixes a bug whereexperimentalStaticHeadersdid not work as expected.#14289
ed493a6Thanks @ascorbic! - Fixes a bug that caused invalid image sizes to be generated when the requested widths were larger than the source imagev8.2.6Compare Source
Patch Changes
4d16de7]:v8.2.5Compare Source
Patch Changes
0567fb7]:v8.2.4Compare Source
Patch Changes
f4e8889]:v8.2.3Compare Source
Patch Changes
42ef004Thanks @jat001! - Changes the default Node.js version of Vercel functions to 22v8.2.2Compare Source
Patch Changes
de5a253Thanks @RobbieTheWagner! - Allow settingdomainstoundefinedinimagesConfigso thatremotePatternscan be better utilized for images from a variety of domains.v8.2.1Compare Source
Patch Changes
#14570
c96711dThanks @matthewp! - Fix regression in 8.2.7: validate densities-based srcset widths against configured sizesWhen using
densitieswith the Vercel image adapter, calculated widths were not being validated against Vercel's configured sizes list. This caused images to fail when using densities, as Vercel would reject the invalid widths.This fix ensures densities-calculated widths are mapped to valid configured sizes, matching the behavior already implemented for the
widthsprop.v8.2.0Compare Source
Minor Changes
#13965
95ece06Thanks @ematipico! - Adds support for the experimental static headers Astro feature.When the feature is enabled via option
experimentalStaticHeaders, and experimental Content Security Policy is enabled, the adapter will generateResponseheaders for static pages, which allows support for CSP directives that are not supported inside a<meta>tag (e.g.frame-ancestors).Patch Changes
#13917
e615216Thanks @ascorbic! - The responsive images feature introduced behind a flag in v5.0.0 is no longer experimental and is available for general use.The new responsive images feature in Astro automatically generates optimized images for different screen sizes and resolutions, and applies the correct attributes to ensure that images are displayed correctly on all devices.
Enable the
or component, or configure a default
image.responsiveStylesoption in your Astro config. Then, set alayoutattribute on anyimage.layout, for instantly responsive images with automatically generatedsrcsetandsizesattributes based on the image's dimensions and the layout type.Displaying images correctly on the web can be challenging, and is one of the most common performance issues seen in sites. This new feature simplifies the most challenging part of the process: serving your site visitor an image optimized for their viewing experience, and for your website's performance.
For full details, see the updated Image guide.
Migration from Experimental Responsive Images
The
experimental.responsiveImagesflag has been removed, and all experimental image configuration options have been renamed to their final names.If you were using the experimental responsive images feature, you'll need to update your configuration:
Remove the experimental flag
export default defineConfig({ experimental: { - responsiveImages: true, }, });Update image configuration options
During the experimental phase, default styles were applied automatically to responsive images. Now, you need to explicitly set the
responsiveStylesoption totrueif you want these styles applied.export default defineConfig({ image: { + responsiveStyles: true, }, });The experimental image configuration options have been renamed:
Before:
After:
Component usage remains the same
The
layout,fit, andpositionprops on<Image>and<Picture>components work exactly the same as before:If you weren't using the experimental responsive images feature, no changes are required.
Please see the Image guide for more information on using responsive images in Astro.
v8.1.5Compare Source
Patch Changes
4a8f193Thanks @moonclavedev! - Handle SVG images correctly in build image servicev8.1.4Compare Source
Patch Changes
5dd2d3fThanks @florian-lefebvre! - Removes unused codev8.1.3Compare Source
Patch Changes
12cc4d8Thanks @ascorbic! - Fixes a bug that caused external redirects to failv8.1.2Compare Source
Patch Changes
042d1de]:v8.1.1Compare Source
Patch Changes
fac32adThanks @ascorbic! - Ensuressrcsetfor responsive images only contains allowed sizesv8.1.0Compare Source
Minor Changes
#13211
7ea0abaThanks @slawekkolodziej! - Adds support for regular expressions in ISR exclude listPreviously, excluding a page from ISR required explicitly listing it in
isr.exclude. As websites grew larger, maintaining this list became increasingly difficult, especially for multiple API routes and pages that needed server-side rendering.To address this, ISR exclusions now support regular expressions, allowing for more flexible and scalable configurations.
Patch Changes
#13323
80926faThanks @ematipico! - Updatesesbuildandviteto the latest to avoid false positives audits warnings caused byesbuild.Updated dependencies [
1e11f5e]:v8.0.8Compare Source
Patch Changes
#13304
6efd57dThanks @ematipico! - Fixes a small issue where the package was pulling an outdated version of its internal dependencies.#13299
2e1321eThanks @bluwy! - Usestinyglobbyfor globbing filesv8.0.7Patch Changes
8e5b89cThanks @ascorbic! - Unpins@vercel/routing-utilsdependency as bug has been fixedv8.0.6Patch Changes
5c2ea1fThanks @ascorbic! - Pins@vercel/routing-utilsto avoid broken versionConfiguration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.