Medium severity6.1NVD Advisory· Published Apr 24, 2026· Updated Apr 27, 2026
CVE-2026-41067
CVE-2026-41067
Description
Astro is a web framework. Prior to 6.1.6, the defineScriptVars function in Astro's server-side rendering pipeline uses a case-sensitive regex /<\/script>/g to sanitize values injected into inline <script> tags via the define:vars directive. HTML parsers close <script> elements case-insensitively and also accept whitespace or / before the closing >, allowing an attacker to bypass the sanitization with payloads like </Script>, </script >, or </script/> and inject arbitrary HTML/JavaScript. This vulnerability is fixed in 6.1.6.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
astronpm | < 6.1.6 | 6.1.6 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/withastro/astro/security/advisories/GHSA-j687-52p2-xcffnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-j687-52p2-xcffghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41067ghsaADVISORY
- github.com/withastro/astro/releases/tag/astro@6.1.6ghsaWEB
News mentions
0No linked articles in our index yet.