PT-2025-31707 · Unknown +1 · @Nestjs/Devtools-Integration +1

Jlleitschuh

·

Published

2025-08-01

·

Updated

2025-08-03

·

CVE-2025-54782

CVSS v4.0
9.4
VectorAV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions:

Nest versions 0.2.0 and below

Description:

Nest is a framework for building scalable Node.js server-side applications. A critical Remote Code Execution (RCE) vulnerability exists in the `@nestjs/devtools-integration` package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox. Due to improper sandboxing and missing cross-origin protections, a malicious website visited by a developer can execute arbitrary code on their local machine. The `/inspector/graph/interact` endpoint accepts JSON input containing a `code` field and executes the provided code in a Node.js `vm.runInNewContext` sandbox.

Recommendations:

Update to Nest version 0.2.1 or later.

Exploit

Fix

RCE

OS Command Injection

CSRF

Command Injection

Weakness Enumeration

Related Identifiers

CVE-2025-54782
GHSA-85CG-CMQ5-QJM7

Affected Products

@Nestjs/Devtools-Integration
Nest