icon

We found results for “

CVE-2025-30208

Good to know:

icon

Date: March 24, 2025

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. "@fs" denies access to files outside of Vite serving allow list. Adding "?raw??" or "?import&raw??" to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as "?" are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using "--host" or "server.host" config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Access Control

CWE-284

Exposure of Sensitive Information to an Unauthorized Actor

CWE-200

Top Fix

icon

Upgrade Version

Upgrade to version vite - 4.5.10;vite - 5.4.15;vite - 6.0.12;vite - 6.1.2;vite - 6.2.3;vite - 4.5.10;https://github.com/vitejs/vite.git - v4.5.10;https://github.com/vitejs/vite.git - v5.4.14;https://github.com/vitejs/vite.git - v6.0.12;https://github.com/vitejs/vite.git - v6.1.2;https://github.com/vitejs/vite.git - v6.2.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us