CVE-2025-32395
JavaScript vulnerability analysis and mitigation

Overview

Vite, a frontend tooling framework for JavaScript, disclosed a security vulnerability (CVE-2025-32395) on April 10, 2025. The vulnerability affects versions prior to 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13, where arbitrary file contents could be exposed to the browser when the dev server runs on Node or Bun. This vulnerability specifically impacts applications that explicitly expose the Vite dev server to the network using --host or server.host config option (GitHub Advisory, NVD).

Technical details

The vulnerability stems from improper handling of HTTP request-targets containing the '#' character. According to HTTP 1.1 specification (RFC 9112), '#' is not allowed in request-targets, and such requests should be rejected with 400 or 301 status codes. However, on Node and Bun runtimes, these requests are not rejected internally and are passed to the user land, where the value of http.IncomingMessage.url contains the '#' character. Vite's assumption that req.url wouldn't contain '#' when checking server.fs.deny allowed these requests to bypass the security check. The vulnerability has been assigned a CVSS v4.0 base score of 6.0 (Medium) with vector string CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

When exploited, this vulnerability allows attackers to access and read arbitrary files on the system where the Vite dev server is running. This could lead to exposure of sensitive information and system files. For example, an attacker could potentially read system files like /etc/passwd through specially crafted requests (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Vite versions 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13. The fix includes implementing proper request validation to reject requests containing '#' in the request-target with a 400 Bad Request response. Users are strongly advised to upgrade to the patched versions. No workarounds are available for this vulnerability (GitHub Advisory, Vite Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management