CVE-2025-30208

Scores

EPSS

0.890high89.0%
0%20%40%60%80%100%

Percentile: 89.0%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Description

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. @fs denies access to files outside of Vite serving allow list. Adding ?raw?? or ?import&raw?? to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as ? are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvd

CWEs

CWE-200

Related Vulnerabilities

Exploits

Exploit ID: 52111

Source: exploitdb

URL: https://www.exploit-db.com/exploits/52111

Exploit ID: CVE-2025-30208

Source: github-poc

URL: https://github.com/HazaVVIP/CVE-2025-30208

Vulnerable Software (3)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",          "versionEndExcluding": "4.5.10"        },        {          "cp...

Source: anchore_overrides

Type: Configuration

Product: node-vite

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Vendor: *

Product: vite

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",      "versionEndExcluding": "4.5.10",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:vite...

Source: nvd

End of list