A vulnerability, identified as CVE-2025-30208, has been discovered in Vite, a popular frontend development tooling provider. This vulnerability is present in versions prior to 6.2.3, 6.1.2, 6..12, 5.4.15, and 4.5.10. The issue occurs when using @fs to deny access to files outside of the Vite serving allow list. By appending ?raw?? or ?import&raw?? to the URL, users can bypass this limitation and return the content of a file if it exists. This security vulnerability is caused by trailing separators, such as ?, being removed in several places but not being considered in query string regexes. Arbitrary files can thus be returned to the browser. This issue affects only apps that explicitly expose the Vite development server to the network using the --host or server.host configuration option. Versions 6.2.3, 6.1.2, 6..12, 5.4.15, and 4.5.10 of Vite have fixed this vulnerability.
Here's an example of how this vulnerability can be exploited
// This is a sample Vite configuration file
export default {
// Invalid config: server.host is set, exposing the Vite dev server to the network
server: {
host: '...',
},
};
With this configuration and a vulnerable version of Vite, an attacker can potentially access unintended files by appending ?raw?? or ?import&raw?? to any URL hosted by the Vite server.
Exploit Details
To exploit the vulnerability, an attacker simply needs to append the bypass string ?raw?? or ?import&raw?? to the URL of an app running a vulnerable version of Vite. For example, if an app is hosted at http://example-vite-app.com, an attacker can attempt to access sensitive files by using an URL like http://example-vite-app.com/sensitive-file.txt?raw??.
This allows the attacker to bypass the Vite allow list and access the content of any file that exists on the server. The attacker can then use this file content for further exploits or information gathering.
To learn more about this vulnerability, you can consult the following resources
1. Vite Security Issue Pull Request – Where the original patch for this vulnerability was proposed and merged.
2. Vite Security Release Notes – Release notes of Vite, including the versions containing security fixes.
3. Vite Security Advisory – The official security advisories posted by the Vite team.
Mitigation and Fixes
To protect your applications from this vulnerability, you should immediately update your Vite dependency to version 6.2.3, 6.1.2, 6..12, 5.4.15, or 4.5.10, depending on your current version. Additionally, you should avoid using --host or server.host options to expose the Vite development server to the network if not necessary.
In summary, Vite users should take immediate action to update their software and ensure their applications are not vulnerable to this exploit. By being aware of this issue and employing best practices, developers can minimize the risk of potential data breaches and maintain a secure development environment.
Timeline
Published on: 03/24/2025 17:15:21 UTC
Last modified on: 03/27/2025 16:45:46 UTC