Vite Frontend Development Tool Susceptible to File Access Vulnerability
CVE-2025-30208
Key Information:
- Vendor
- Vite
- Status
- Vite
- Vendor
- CVE Published:
- 24 March 2025
Badges
What is CVE-2025-30208?
CVE-2025-30208 is a vulnerability found in Vite, a popular frontend development tool used for building and serving web applications. This vulnerability affects versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10, and it could negatively impact organizations by allowing unauthorized access to sensitive files. The flaw arises from a failure to restrict direct access to files outside the allowed list when specific query parameters are used in the URL, which could lead to significant security risks if exploited.
Technical Details
The vulnerability specifically allows an attacker to bypass the @fs
file access restrictions of Vite by appending ?raw
or ?import&raw
to the URL. This results from the mishandling of trailing separators in the query string, enabling access to arbitrary files residing on the server. Only applications that expose the Vite development server to external networks are at risk, particularly those configured with --host
or the server.host
option.
Potential Impact of CVE-2025-30208
-
Unauthorized File Disclosure: The vulnerability can lead to the unauthorized exposure of sensitive files, such as configuration files or environment variables, allowing attackers to gather sensitive information about the application and its infrastructure.
-
Increased Attack Surface: By revealing file contents, attackers may gain insights necessary for further exploits, such as injection attacks or systemic breaches, enabling a more effective strategy to compromise the application fully.
-
Compromise of Development Environments: The accessibility of files could impact the integrity and security of development and testing environments, potentially leading to the introduction of backdoors or malicious code during the development lifecycle.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.