Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-30208— Vite bypasses server.fs.deny when using `?raw??`

CVSS 5.3 · Medium EPSS 89.85% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-30208

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Vite bypasses server.fs.deny when using `?raw??`
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vite 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vite是Vite开源的一种新型的前端构建工具。 Vite存在访问控制错误漏洞,该漏洞源于URL中的`?raw??`或`?import&raw??`可以绕过文件访问限制,返回任意文件内容。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
vitejsvite < 4.5.10 -

II. Public POCs for CVE-2025-30208

#POC DescriptionSource LinkShenlong Link
1最新的CVE-2025-30208的poc(这个仓库主要拿来写实战src的一些自己写的bypass-waf的脚本以及搜集的干货博主)https://github.com/LiChaser/CVE-2025-30208POC Details
2全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generationhttps://github.com/xuemian168/CVE-2025-30208POC Details
3CVE-2025-30208-EXPhttps://github.com/ThumpBo/CVE-2025-30208-EXPPOC Details
4CVE-2025-30208 检测工具。python script && nuclei templatehttps://github.com/xaitx/CVE-2025-30208POC Details
5CVE-2025-30208漏洞验证工具https://github.com/kk12-30/CVE-2025-30208POC Details
6CVE-2025-30208 任意文件读取漏洞快速验证https://github.com/YuanBenSir/CVE-2025-30208_POCPOC Details
7CVE-2025-30208-EXP 任意文件读取https://github.com/marino-admin/Vite-CVE-2025-30208-ScannerPOC Details
8CVE-2025-30208动态检测脚本,支持默认路径,自定义路径动态检测https://github.com/iSee857/CVE-2025-30208-PoCPOC Details
9This exploit is for educational and ethical security testing purposes only. The use of this exploit against targets without prior mutual consent is illegal, and the developer disclaims any liability for misuse or damage caused by this exploit.https://github.com/On1onss/CVE-2025-30208-LFIPOC Details
10CVE-2025-30208 | Vite脚本https://github.com/sadhfdw129/CVE-2025-30208-VitePOC Details
11CVE-2025-30208 ViteVulnScannerhttps://github.com/keklick1337/CVE-2025-30208-ViteVulnScannerPOC Details
12A PoC of the exploit script for the Arbitrary File Read vulnerability of Vite /@fs/ Path Traversal in the transformMiddleware (CVE-2025-30208). https://github.com/4xura/CVE-2025-30208POC Details
13针对CVE-2025-30208和CVE-2025-31125的漏洞利用https://github.com/jackieya/ViteVulScanPOC Details
14Nonehttps://github.com/0xshaheen/CVE-2025-30208POC Details
15mass scan for CVE-2025-30208https://github.com/sumeet-darekar/CVE-2025-30208POC Details
16CVE-2025-30208 - Vite Arbitrary File Read PoChttps://github.com/4m3rr0r/CVE-2025-30208-PoCPOC Details
17Vite-CVE-2025-30208-EXP单目标检测,支持自定义读取路径,深度检索https://github.com/lilil3333/Vite-CVE-2025-30208-EXPPOC Details
18Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-30208.yamlPOC Details
19Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Vite%20%E5%BC%80%E5%8F%91%E6%9C%8D%E5%8A%A1%E5%99%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E7%BB%95%E8%BF%87%20CVE-2025-30208.mdPOC Details
20https://github.com/vulhub/vulhub/blob/master/vite/CVE-2025-30208/README.mdPOC Details
21CVE-2025-30208 vite file read nuclei templatehttps://github.com/imbas007/CVE-2025-30208-templatePOC Details
22Analysis of the Reproduction of CVE-2025-30208 Series Vulnerabilitieshttps://github.com/r0ngy40/CVE-2025-30208-SeriesPOC Details
23Nonehttps://github.com/nkuty/CVE-2025-30208-31125-31486-32395POC Details
24POChttps://github.com/HaGsec/CVE-2025-30208POC Details
25CVE-2025-30208https://github.com/B1ack4sh/Blackash-CVE-2025-30208POC Details
26CVE‑2025‑30208 is a medium-severity arbitrary file read vulnerability in the Vite development server (a popular frontend build tool)https://github.com/ThemeHackers/CVE-2025-30208POC Details
27CVE‑2025‑30208 is a medium-severity arbitrary file read vulnerability in the Vite development server (a popular frontend build tool)https://github.com/TH-SecForge/CVE-2025-30208POC Details
28CVE-2025-30208https://github.com/gonn4cry/CVE-2025-30208POC Details
29🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.https://github.com/Dany60-98/CVE-2025-30208-EXPPOC Details
30CVE-2025-30208https://github.com/bugdotexe/CVE-2025-30208POC Details
31CVE-2025-30208https://github.com/qodo-dev/CVE-2025-30208POC Details
32CVE-2025-30208 任意文件读取漏洞快速验证https://github.com/MiclelsonCN/CVE-2025-30208_POCPOC Details
33CVE-2025-30208 检测工具。python script && nuclei templatehttps://github.com/Lusensec/CVE-2025-30208POC Details
34CVE-2025-30208https://github.com/Ashwesker/Blackash-CVE-2025-30208POC Details
35This repository documents CVE-2025-30208, an Arbitrary File Read vulnerability affecting Vite development servers when misconfigured or exposed to untrusted networks.https://github.com/layanOd/CVE-2025-30208-Arbitrary-File-Read-in-Vite-serversPOC Details
36This exploit is for educational and ethical security testing purposes only. The use of this exploit against targets without prior mutual consent is illegal, and the developer disclaims any liability for misuse or damage caused by this exploit.https://github.com/On1onss/CVE-2025-30208POC Details
37CVE-2025-30208https://github.com/Ashwesker/Ashwesker-CVE-2025-30208POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-30208

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-30208

No comments yet


Leave a comment