
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Vite, a frontend tooling framework for JavaScript, was found to contain a security vulnerability (CVE-2025-24010) that allowed any websites to send requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. The vulnerability was discovered on January 20, 2025, affecting versions up to 6.0.8, 5.4.11, and 4.5.5. This issue has been fixed in versions 6.0.9, 5.4.12, and 4.5.6 (GitHub Advisory).
The vulnerability received a CVSS v3.1 score of 6.5 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. The issue stemmed from three main causes: permissive default CORS settings that set Access-Control-Allow-Origin: *, lack of validation on the Origin header for WebSocket connections making it vulnerable to Cross-Site WebSocket Hijacking (CSWSH) attacks, and insufficient validation of the Host header for HTTP requests (GitHub Advisory).
The vulnerability could allow malicious websites to steal source code, access unauthorized functionalities, and intercept sensitive information. For WebSocket connections, attackers could obtain file paths of changed files and file content where errors occurred. The impact was particularly significant for users running the Vite dev server locally, even without exposing it to the network (GitHub Advisory).
For users unable to upgrade, mitigation steps include setting server.cors to false or limiting server.cors.origin to trusted origins. Users of the backend integration feature need to add the origin of the backend server to the server.cors.origin option. Those using reverse proxies or accessing the development server via non-localhost domains must add the hostname to the server.allowedHosts option. For WebSocket-related issues, users can set legacy.skipWebSocketTokenCheck: true, though this should be done with caution (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”