Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-31125— Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query

CVSS 5.3 · Medium KEV EPSS 84.26% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-31125

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vite 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vite是Vite开源的一种新型的前端构建工具。 Vite存在安全漏洞,该漏洞源于存在暴露非允许文件内容问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
vitejsvite >= 6.2.0, < 6.2.4 -

II. Public POCs for CVE-2025-31125

#POC DescriptionSource LinkShenlong Link
1Vite 任意文件读取漏洞POChttps://github.com/sunhuiHi666/CVE-2025-31125POC Details
2Path traversal vulnerability in Vite development server's @fs endpoint allows attackers to access files outside the intended directory. When exposed to the network, attackers can exploit this via crafted URLs to access sensitive system files. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-31125.yamlPOC Details
3Vite WASM Import Path Traversal 🛡️https://github.com/0xgh057r3c0n/CVE-2025-31125POC Details
4Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-POC Details
5 Vite Development Server's @fs endpoint (CVE-2025-31125) to access sensitive files like /etc/passwd and /etc/hosts via crafted URLs.https://github.com/MuhammadWaseem29/Vitejs-exploitPOC Details
6Nonehttps://github.com/nak000/Vitejs-exploit-CVE-2025-31125-rcePOC Details
7Vite WASM Import Path Traversal 🛡️https://github.com/zr1p3r/CVE-2025-31125POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-31125

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-31125

No comments yet


Leave a comment