Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
References
| Link | Resource |
|---|---|
| https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949 | Patch |
| https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8 | Exploit Vendor Advisory |
| https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-31 17:15
Updated : 2025-09-24 15:45
NVD link : CVE-2025-31125
Mitre link : CVE-2025-31125
CVE.ORG link : CVE-2025-31125
JSON object : View
Products Affected
vitejs
- vite
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-284Improper Access Control
NVD-CWE-noinfo