Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-39364— Vite has a `server.fs.deny` bypass with queries

EPSS 3.92% · P88
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-39364

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Vite has a `server.fs.deny` bypass with queries
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vite is a frontend tooling framework for JavaScript. From 7.1.0 to before 7.3.2 and 8.0.5, on the Vite dev server, files that should be blocked by server.fs.deny (e.g., .env, *.crt) can be retrieved with HTTP 200 responses when query parameters such as ?raw, ?import&raw, or ?import&url&inline are appended. This vulnerability is fixed in 7.3.2 and 8.0.5.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不正确的行为次序:规范化之前验证
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vite 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vite是Vite开源的一种新型的前端构建工具。 Vite 7.1.0至7.3.2之前版本和8.0.5之前版本存在访问控制错误漏洞,该漏洞源于服务器文件拒绝列表可被绕过,可能导致检索应被阻止的文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
vitejsvite >= 8.0.0, < 8.0.5 -
vitejsvite-plus < 0.1.16 -

II. Public POCs for CVE-2026-39364

#POC DescriptionSource LinkShenlong Link
1Vite is a modern frontend build tool. In Vite prior to versions 6.4.3, 6.3.4, and 5.4.23, a directory traversal vulnerability affects the Vite development server. When the Vite dev server is launched with the --host or server.host option, an unauthenticated attacker can craft a request with a path containing dot segments (e.g., /.vite/../<filename>) to bypass static file restrictions and access arbitrary files on the filesystem under the project root. The vulnerability allows access to files normally denied by Vite’s "server.fs.deny" setting, including sensitive files like .env, configuration files, or credentials in the project root. This issue has been fixed in versions 6.4.3, 6.3.4, and 5.4.23. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-39364.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-39364

登录查看更多情报信息。

Same Patch Batch · vitejs · 2026-04-07 · 3 CVEs total

CVE-2026-39363Vite Affected by Arbitrary File Read via Vite Dev Server WebSocket
CVE-2026-39365Vite has a Path Traversal in Optimized Deps `.map` Handling

IV. Related Vulnerabilities

V. Comments for CVE-2026-39364

No comments yet


Leave a comment