`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.","url":"https://cvedatabase.com/cve/CVE-2023-49293","datePublished":"2023-12-04T23:15:27.730"}},{"@type":"ListItem","position":9,"item":{"@type":"NewsArticle","name":"CVE-2023-34092","headline":"CVE-2023-34092 - HIGH Severity Vulnerability","description":"Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.","url":"https://cvedatabase.com/cve/CVE-2023-34092","datePublished":"2023-06-01T17:15:10.947"}},{"@type":"ListItem","position":10,"item":{"@type":"NewsArticle","name":"CVE-2022-35204","headline":"CVE-2022-35204 - MEDIUM Severity Vulnerability","description":"Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.","url":"https://cvedatabase.com/cve/CVE-2022-35204","datePublished":"2022-08-18T19:15:14.550"}}],"name":"vitejs Vulnerabilities","description":"List of recent security vulnerabilities for vitejs"}

vitejs Vulnerabilities

Browse the latest common vulnerabilities and exposures (CVEs) related to vitejs. Use this page to track security alerts, assess risk scores, and find automated remediation steps for vitejs products. Stay ahead of zero-day exploits and ensure your systems are patched against known threats.

Total Vulnerabilities
10
Critical Issues
0
Average CVSS Score
5.3

Search Results

Showing 1-10 of 10 vulnerabilities

Sort (this page):

Default order is newest first across all pages. Manual sort buttons apply within the current page.