We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46565

Vite's server.fs.deny bypassed with /. for files under project root



Description

Vite is a frontend tooling framework for javascript. Prior to versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14, the contents of files in the project root that are denied by a file matching pattern can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Only files that are under project root and are denied by a file matching pattern can be bypassed. `server.fs.deny` can contain patterns matching against files (by default it includes .env, .env.*, *.{crt,pem} as such patterns). These patterns were able to bypass for files under `root` by using a combination of slash and dot (/.). This issue has been patched in versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14.

Reserved 2025-04-24 | Published 2025-05-01 | Updated 2025-05-02 | Assigner GitHub_M


MEDIUM: 6.0CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 6.3.0, < 6.3.4
affected

>= 6.2.0, < 6.2.7
affected

>= 6.0.0, < 6.1.6
affected

>= 5.0.0, < 5.4.19
affected

< 4.5.14
affected

References

github.com/...s/vite/security/advisories/GHSA-859w-5945-r5v3

github.com/...ommit/c22c43de612eebb6c182dd67850c24e4fab8cacb

cve.org (CVE-2025-46565)

nvd.nist.gov (CVE-2025-46565)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46565

Support options

Helpdesk Chat, Email, Knowledgebase