Vite is a frontend tooling framework for JavaScript. Prior to versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20, any HTML files on the machine were served regardless of the `server.fs` settings. Only apps that explicitly expose the Vite dev server to the network (using --host or server.host config option) and use `appType: 'spa'` (default) or `appType: 'mpa'` are affected. This vulnerability also affects the preview server. The preview server allowed HTML files not under the output directory to be served. Versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20 fix the issue.
References
Configurations
Configuration 1 (hide)
|
History
17 Sep 2025, 16:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Vitejs
Vitejs vite |
|
References | () https://github.com/vitejs/vite/commit/0ab19ea9fcb66f544328f442cf6e70f7c0528d5f - Patch | |
References | () https://github.com/vitejs/vite/commit/14015d794f69accba68798bd0e15135bc51c9c1e - Patch | |
References | () https://github.com/vitejs/vite/commit/482000f57f56fe6ff2e905305100cfe03043ddea - Patch | |
References | () https://github.com/vitejs/vite/commit/6f01ff4fe072bcfcd4e2a84811772b818cd51fe6 - Patch | |
References | () https://github.com/vitejs/vite/security/advisories/GHSA-jqfw-vq24-v9c3 - Exploit, Third Party Advisory |
09 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/vitejs/vite/security/advisories/GHSA-jqfw-vq24-v9c3 - |
08 Sep 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-08 23:15
Updated : 2025-09-17 16:12
NVD link : CVE-2025-58752
Mitre link : CVE-2025-58752
CVE.ORG link : CVE-2025-58752
JSON object : View
Products Affected
vitejs
- vite