HomeVitejsCVE-2025-30208

CVE-2025-30208

MEDIUM
5.3CVSS
Published: 2025-03-24
Updated: 2025-09-23
AI Analysis

Description

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
none
Availability
none
Weaknesses
CWE-200CWE-284NVD-CWE-noinfo

Metadata

Primary Vendor
VITEJS
Published
3/24/2025
Last Modified
9/23/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

vitejs : vitevitejs : vitevitejs : vitevitejs : vitevitejs : vite

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief