Cyber Posture

CVE-2025-30208

MediumPublic PoC

Published: 24 March 2025

Published
24 March 2025
Modified
23 September 2025
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
EPSS Score 0.8985 99.6th percentile
Risk Priority 65 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-30208 is a vulnerability in Vite, a frontend development tooling provider, affecting versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. The issue lies in the `@fs` module, which is designed to deny access to files outside Vite's serving allow list. However, appending `?raw??` or `?import&raw??` to a URL bypasses this restriction, allowing the contents of arbitrary files to be returned to the browser if they exist. This occurs because trailing separators like `?` are stripped in several code paths but not properly accounted for in query string regexes.

The vulnerability can be exploited by remote attackers with network access to a Vite development server explicitly exposed via the `--host` flag or `server.host` configuration option. Exploitation requires high attack complexity and user interaction, such as tricking a user into visiting a crafted URL (CVSS 5.3: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N). Successful attacks enable arbitrary file disclosure, resulting in high confidentiality impact through exposure of sensitive file contents like configuration files or source code directly to the browser.

Mitigation is available in the fixed versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. Patch details are provided in the following Vite GitHub commits: https://github.com/vitejs/vite/commit/315695e9d97cc6cfa7e6d9e0229fb50cdae3d9f4, https://github.com/vitejs/vite/commit/80381c38d6f068b12e6e928cd3c616bd1d64803c, https://github.com/vitejs/vite/commit/807d7f06d33ab49c48a2a3501da3eea1906c0d41, https://github.com/vitejs/vite/commit/92ca12dc79118bf66f2b32ff81ed09e0d0bd07ca, and https://github.com/vitejs/vite/commit/f234b5744d8b74c95535a7b82cc88ed2144263c1. Affected deployments should upgrade immediately and avoid exposing dev servers to untrusted networks.

Details

CWE(s)
CWE-200CWE-284NVD-CWE-noinfo

Affected Products

vitejs
vite
≤ 4.5.10 · 5.0.0 — 5.4.15 · 6.0.0 — 6.0.12

MITRE ATT&CK Enterprise Techniques

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Vulnerability enables arbitrary local file read via exposed Vite dev server (public-facing web application exploitation), facilitating file/directory discovery and collection of data from local system.

References