CVE-2025-24963

MEDIUM NUCLEI

Vitest Browser Mode - Local File Read

Title source: nuclei

Description

Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handler from remote to get the content of arbitrary files.This `__screenshot-error` handler on the browser mode HTTP server responds any file on the file system. This code was added by commit `2d62051`. Users explicitly exposing the browser mode server to the network by `browser.api.host: true` may get any files exposed. This issue has been addressed in versions 2.1.9 and 3.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Exploits (2)

nomisec WORKING POC
by hiteshpatra · poc
https://github.com/hiteshpatra/CVE-2025-24963
nomisec WORKING POC
by 0xdeviner · poc
https://github.com/0xdeviner/CVE-2025-24963

Nuclei Templates (1)

Vitest Browser Mode - Local File Read
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch

Scores

CVSS v3 5.9
EPSS 0.2364
EPSS Percentile 96.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-22
Status published
Products (2)
vitest/browser 2.0.4 - 2.1.9npm
vitest.dev/vitest < 2.1.9
Published Feb 04, 2025
Tracked Since Feb 18, 2026