PT-2025-12667 · Vite · Vite

Published

2025-03-24

·

Updated

2026-04-04

·

CVE-2025-30208

CVSS v2.0

7.8

High

AV:N/AC:L/Au:N/C:C/I:N/A:N
Name of the Vulnerable Software and Affected Versions Vite versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10.
Description Vite is susceptible to a file access bypass, allowing unauthorized access to arbitrary files when the development server is exposed to the network. By appending ?raw?? or ?import&raw?? to a URL targeting the @fs path, an attacker can bypass access restrictions and retrieve the content of files. This bypass occurs because trailing separators are not consistently handled in query string regexes. Exploitation requires the Vite development server to be accessible remotely, typically on port 5173. Multiple reports indicate active scanning and exploitation attempts in the wild, with attackers attempting to read sensitive files such as /etc/environment and .aws/credentials. Millions of web applications are potentially at risk.
Recommendations Upgrade Vite to version 6.2.3 or later. If you are using Vite, ensure that the development server is not exposed to the public network. Bind the server to localhost or use firewall rules to block external access. Place the development server behind an authenticated reverse proxy or VPN. Remove credentials from local files where possible and rotate any potentially exposed credentials. Monitor web access logs and WAF/IDS for requests containing /@fs/ and query patterns containing ?raw?? or ?import&raw??.

Exploit

Fix

Information Disclosure

RCE

Improper Access Control

Weakness Enumeration

Related Identifiers

BDU:2025-03698
CVE-2025-30208
GHSA-X574-M823-4X7W

Affected Products

Vite