CVE-2024-29896

Astro-Shield is a library to compute the subresource integrity hashes for your JS scripts and CSS stylesheets. When automated CSP headers generation for SSR content is enabled and the web application serves content that can be partially controlled by external users, then it is possible that the CSP headers generation feature might be "allow-listing" malicious injected resources like inlined JS, or references to external malicious scripts. The fix is available in version 1.3.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kindspells:astro-shield:1.2.0:*:*:*:*:*:*:*

History

19 Sep 2025, 15:59

Type Values Removed Values Added
References () https://github.com/KindSpells/astro-shield/commit/41b84576d37fa486a57005ea297658d0bc38566d - () https://github.com/KindSpells/astro-shield/commit/41b84576d37fa486a57005ea297658d0bc38566d - Patch
References () https://github.com/KindSpells/astro-shield/security/advisories/GHSA-w387-5qqw-7g8m - () https://github.com/KindSpells/astro-shield/security/advisories/GHSA-w387-5qqw-7g8m - Vendor Advisory
CPE cpe:2.3:a:kindspells:astro-shield:1.2.0:*:*:*:*:*:*:*
First Time Kindspells astro-shield
Kindspells

Information

Published : 2024-03-28 13:15

Updated : 2025-09-19 15:59


NVD link : CVE-2024-29896

Mitre link : CVE-2024-29896

CVE.ORG link : CVE-2024-29896


JSON object : View

Products Affected

kindspells

  • astro-shield
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')