CVE-2025-30360
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-30360 affects webpack-dev-server, a development server that provides live reloading functionality for webpack. The vulnerability was discovered and disclosed on June 3, 2025, affecting versions prior to 5.2.1. The issue allows attackers to potentially steal source code when users access malicious websites using non-Chromium based browsers (GitHub Advisory).

Technical details

The vulnerability stems from webpack-dev-server's handling of Origin headers in WebSocket connections. While the server implements checks to prevent Cross-site WebSocket hijacking (previously reported in CVE-2018-14732), it always allows IP address Origin headers. This implementation flaw enables websites served on IP addresses to establish WebSocket connections, potentially leading to unauthorized source code access. The vulnerability has been assigned a CVSS v3.1 score of 6.5 (Medium) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N (GitHub Advisory).

Impact

The primary impact of this vulnerability is the potential theft of source code from applications using webpack-dev-server. This risk specifically affects users who utilize predictable ports and non-Chromium based browsers. The vulnerability does not affect Chrome 94+ and other Chromium-based browsers due to their non-HTTPS private access blocking feature (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in webpack-dev-server version 5.2.1. Users are strongly advised to upgrade to this version or later to protect against potential source code theft. For users who cannot immediately upgrade, switching to a Chromium-based browser (version 94 or later) provides protection through the browser's built-in security features (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management