Vulnerability DatabaseGHSA-4pfg-2mw5-f8jx

GHSA-4pfg-2mw5-f8jx
JavaScript vulnerability analysis and mitigation

Overview

The Cloudflare Vite plugin (npm package @cloudflare/vite-plugin) versions prior to 1.6.0 contained a vulnerability where the built-in dev server exposed sensitive files in its default configuration. This security issue, identified as GHSA-4pfg-2mw5-f8jx, was discovered and disclosed on July 7, 2025, with a patch released on July 8, 2025. The vulnerability allowed unauthorized access to sensitive files including .env and .dev.vars files through the local development server (GitHub Advisory).

Technical details

The vulnerability stems from the default configuration of the Vite plugin's dev server, which inadvertently exposed all files in the root directory, including sensitive configuration files. The issue could be triggered when running the dev server, particularly when exposed to a network using commands like npm run dev -- -- --host 0.0.0.0. The vulnerability has been assigned a CVSS score of 6.9 (Moderate) with attack vector: Network, attack complexity: Low, and privileges required: None. The weakness is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) (GitHub Advisory).

Impact

When exploited, this vulnerability could lead to the exposure of sensitive information including environment variables, development variables, package dependencies, and internal documentation. The impact is particularly significant when the dev server is exposed on public networks or when sharing application previews using cloudflared, as it could allow attackers to access confidential configuration data (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.6.0 of @cloudflare/vite-plugin. Users are strongly advised to upgrade to this version or later to prevent unauthorized access to sensitive files. The fix includes restrictions on access to .dev.vars files and other sensitive content through the dev server (Workers SDK Commit).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66456CRITICAL9.1
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-66457HIGH7.5
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-65849MEDIUM6.9
  • JavaScriptJavaScript
  • altcha
NoNoDec 08, 2025
CVE-2025-66202MEDIUM6.5
  • JavaScriptJavaScript
  • astro
NoYesDec 09, 2025
CVE-2025-14284MEDIUM5.1
  • JavaScriptJavaScript
  • @tiptap/extension-link
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management