CVE-2025-24963
MEDIUM NUCLEIVitest Browser Mode - Local File Read
Title source: nucleiDescription
Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handler from remote to get the content of arbitrary files.This `__screenshot-error` handler on the browser mode HTTP server responds any file on the file system. This code was added by commit `2d62051`. Users explicitly exposing the browser mode server to the network by `browser.api.host: true` may get any files exposed. This issue has been addressed in versions 2.1.9 and 3.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Exploits (2)
Nuclei Templates (1)
Vitest Browser Mode - Local File Read
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch
References (4)
Scores
CVSS v3
5.9
EPSS
0.2364
EPSS Percentile
96.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (2)
vitest/browser
2.0.4 - 2.1.9npm
vitest.dev/vitest
< 2.1.9
Published
Feb 04, 2025
Tracked Since
Feb 18, 2026