
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-30360 affects webpack-dev-server, a development server that provides live reloading functionality for webpack. The vulnerability was discovered and disclosed on June 3, 2025, affecting versions prior to 5.2.1. The issue allows attackers to potentially steal source code when users access malicious websites using non-Chromium based browsers (GitHub Advisory).
The vulnerability stems from webpack-dev-server's handling of Origin headers in WebSocket connections. While the server implements checks to prevent Cross-site WebSocket hijacking (previously reported in CVE-2018-14732), it always allows IP address Origin headers. This implementation flaw enables websites served on IP addresses to establish WebSocket connections, potentially leading to unauthorized source code access. The vulnerability has been assigned a CVSS v3.1 score of 6.5 (Medium) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N (GitHub Advisory).
The primary impact of this vulnerability is the potential theft of source code from applications using webpack-dev-server. This risk specifically affects users who utilize predictable ports and non-Chromium based browsers. The vulnerability does not affect Chrome 94+ and other Chromium-based browsers due to their non-HTTPS private access blocking feature (GitHub Advisory).
The vulnerability has been patched in webpack-dev-server version 5.2.1. Users are strongly advised to upgrade to this version or later to protect against potential source code theft. For users who cannot immediately upgrade, switching to a Chromium-based browser (version 94 or later) provides protection through the browser's built-in security features (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”