Vite Frontend Development Tool Susceptible to File Access Vulnerability
CVE-2025-30208

Currently unrated

Key Information:

Vendor
Vite
Status
Vite
Vendor
CVE Published:
24 March 2025

Badges

📈 Trended📈 Score: 2,580👾 Exploit Exists🟡 Public PoC🟣 EPSS 40%

What is CVE-2025-30208?

CVE-2025-30208 is a vulnerability found in Vite, a popular frontend development tool used for building and serving web applications. This vulnerability affects versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10, and it could negatively impact organizations by allowing unauthorized access to sensitive files. The flaw arises from a failure to restrict direct access to files outside the allowed list when specific query parameters are used in the URL, which could lead to significant security risks if exploited.

Technical Details

The vulnerability specifically allows an attacker to bypass the @fs file access restrictions of Vite by appending ?raw or ?import&raw to the URL. This results from the mishandling of trailing separators in the query string, enabling access to arbitrary files residing on the server. Only applications that expose the Vite development server to external networks are at risk, particularly those configured with --host or the server.host option.

Potential Impact of CVE-2025-30208

  1. Unauthorized File Disclosure: The vulnerability can lead to the unauthorized exposure of sensitive files, such as configuration files or environment variables, allowing attackers to gather sensitive information about the application and its infrastructure.

  2. Increased Attack Surface: By revealing file contents, attackers may gain insights necessary for further exploits, such as injection attacks or systemic breaches, enabling a more effective strategy to compromise the application fully.

  3. Compromise of Development Environments: The accessibility of files could impact the integrity and security of development and testing environments, potentially leading to the introduction of backdoors or malicious code during the development lifecycle.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

40% chance of being exploited in the next 30 days.

Timeline

  • 📈

    Vulnerability started trending

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.