Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Vite 任意文件读取漏洞POC | https://github.com/sunhuiHi666/CVE-2025-31125 | POC Details |
| 2 | Path traversal vulnerability in Vite development server's @fs endpoint allows attackers to access files outside the intended directory. When exposed to the network, attackers can exploit this via crafted URLs to access sensitive system files. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-31125.yaml | POC Details |
| 3 | Vite WASM Import Path Traversal 🛡️ | https://github.com/0xgh057r3c0n/CVE-2025-31125 | POC Details |
| 4 | Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11. | https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125- | POC Details |
| 5 | Vite Development Server's @fs endpoint (CVE-2025-31125) to access sensitive files like /etc/passwd and /etc/hosts via crafted URLs. | https://github.com/MuhammadWaseem29/Vitejs-exploit | POC Details |
| 6 | None | https://github.com/nak000/Vitejs-exploit-CVE-2025-31125-rce | POC Details |
| 7 | Vite WASM Import Path Traversal 🛡️ | https://github.com/zr1p3r/CVE-2025-31125 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet