Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: python312Packages.django-vite

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2025-31125
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months ago by @fricklerhandwerk Activity log
  • Created automatic suggestion
  • @fricklerhandwerk removed
    2 maintainers
    • @sephii
    • @urandom2
  • @fricklerhandwerk added maintainer @urandom2
Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query

Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.

Affected products

vite
  • ==< 4.5.11
  • ==>= 5.0.0, < 5.4.16
  • ==>= 6.0.0, < 6.0.13
  • ==>= 6.1.0, < 6.1.3
  • ==>= 6.2.0, < 6.2.4

Matching in nixpkgs

pkgs.vite

Visual Trace Explorer (ViTE), a tool to visualize execution traces

Package maintainers

Ignored maintainers (1)