CVE-2025-30208
MEDIUM EXPLOITED NUCLEIVite - Arbitrary File Read
Title source: nucleiDescription
Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.
Exploits (34)
nomisec
SCANNER
10 stars
by marino-admin · infoleak
https://github.com/marino-admin/Vite-CVE-2025-30208-Scanner
nomisec
WORKING POC
5 stars
by nkuty · infoleak
https://github.com/nkuty/CVE-2025-30208-31125-31486-32395
nomisec
SCANNER
1 stars
by lilil3333 · infoleak
https://github.com/lilil3333/Vite-CVE-2025-30208-EXP
nomisec
SCANNER
1 stars
by sumeet-darekar · infoleak
https://github.com/sumeet-darekar/CVE-2025-30208
nomisec
SCANNER
1 stars
by keklick1337 · infoleak
https://github.com/keklick1337/CVE-2025-30208-ViteVulnScanner
Nuclei Templates (1)
Vite - Arbitrary File Read
MEDIUMVERIFIEDby v2htw,s4e-io
FOFA:
body="/@vite/client"
References (6)
Scores
CVSS v3
5.3
EPSS
0.8896
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2025-04-28
CWE
CWE-284
CWE-200
Status
published
Products (2)
npm/vite
6.2.0 - 6.2.3npm
vitejs/vite
< 4.5.10
Published
Mar 24, 2025
Tracked Since
Feb 18, 2026