CVE-2025-46565
JavaScript vulnerability analysis and mitigation

Overview

Vite, a frontend tooling framework for JavaScript, was found to have a path traversal vulnerability (CVE-2025-46565) discovered and disclosed on May 1, 2025. The vulnerability affects versions prior to 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14, allowing unauthorized access to denied files in the project root through path traversal (GitHub Advisory, NVD).

Technical details

The vulnerability exists in the server.fs.deny configuration which contains patterns for matching against files (by default including .env, .env., .{crt,pem}). These patterns could be bypassed for files under the project root by using a combination of slash and dot (/.). The vulnerability has received a CVSS v4.0 base score of 6.0 (MEDIUM) with the vector string CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

The vulnerability only affects applications that explicitly expose the Vite dev server to the network (using --host or server.host config option). When successfully exploited, attackers can access files that are under the project root and are denied by file matching patterns, potentially exposing sensitive information like environment variables and certificate files (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14. Users are advised to upgrade to these versions or later to mitigate the vulnerability (NVD, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management