We found results for “”
CVE-2025-31486
Good to know:
Date: April 3, 2025
Vite is a frontend tooling framework for javascript. The contents of arbitrary files can be returned to the browser. By adding ?.svg with ?.wasm?init or with sec-fetch-dest: script header, the server.fs.deny restriction was able to bypass. This bypass is only possible if the file is smaller than build.assetsInlineLimit (default: 4kB) and when using Vite 6.0+. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 4.5.12, 5.4.17, 6.0.14, 6.1.4, and 6.2.5.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version vite - 4.5.12;vite - 5.4.17;vite - 6.0.14;vite - 6.1.4;vite - 6.2.5;vite - 4.5.12;https://github.com/vitejs/vite.git - v4.5.12;https://github.com/vitejs/vite.git - v5.4.17;https://github.com/vitejs/vite.git - v6.0.14;https://github.com/vitejs/vite.git - v6.1.4;https://github.com/vitejs/vite.git - v6.2.5
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


