Skip to content

chore(deps): update dependency vite to v5.4.21 [security]#402

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-vite-vulnerability
Open

chore(deps): update dependency vite to v5.4.21 [security]#402
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-vite-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Apr 4, 2025

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Confidence
vite (source) 5.3.35.4.21 age confidence

GitHub Vulnerability Alerts

CVE-2025-31486

Summary

The contents of arbitrary files can be returned to the browser.

Impact

Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.

Details

.svg

Requests ending with .svg are loaded at this line.
https://github.com/vitejs/vite/blob/037f801075ec35bb6e52145d659f71a23813c48f/packages/vite/src/node/plugins/asset.ts#L285-L290
By adding ?.svg with ?.wasm?init or with sec-fetch-dest: script header, the restriction was able to bypass.

This bypass is only possible if the file is smaller than build.assetsInlineLimit (default: 4kB) and when using Vite 6.0+.

relative paths

The check was applied before the id normalization. This allowed requests to bypass with relative paths (e.g. ../../).

PoC

npm create vite@latest
cd vite-project/
npm install
npm run dev

send request to read etc/passwd

curl 'http://127.0.0.1:5173/etc/passwd?.svg?.wasm?init'
curl 'http://127.0.0.1:5173/@​fs/x/x/x/vite-project/?/../../../../../etc/passwd?import&?raw'

CVE-2025-32395

Summary

The contents of arbitrary files can be returned to the browser if the dev server is running on Node or Bun.

Impact

Only apps with the following conditions are affected.

  • explicitly exposing the Vite dev server to the network (using --host or server.host config option)
  • running the Vite dev server on runtimes that are not Deno (e.g. Node, Bun)

Details

HTTP 1.1 spec (RFC 9112) does not allow # in request-target. Although an attacker can send such a request. For those requests with an invalid request-line (it includes request-target), the spec recommends to reject them with 400 or 301. The same can be said for HTTP 2 (ref1, ref2, ref3).

On Node and Bun, those requests are not rejected internally and is passed to the user land. For those requests, the value of http.IncomingMessage.url contains #. Vite assumed req.url won't contain # when checking server.fs.deny, allowing those kinds of requests to bypass the check.

On Deno, those requests are not rejected internally and is passed to the user land as well. But for those requests, the value of http.IncomingMessage.url did not contain #.

PoC

npm create vite@latest
cd vite-project/
npm install
npm run dev

send request to read /etc/passwd

curl --request-target /@​fs/Users/doggy/Desktop/vite-project/#/../../../../../etc/passwd http://127.0.0.1:5173

CVE-2025-46565

Summary

The contents of files in the project root that are denied by a file matching pattern can be returned to the browser.

Impact

Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.
Only files that are under project root and are denied by a file matching pattern can be bypassed.

  • Examples of file matching patterns: .env, .env.*, *.{crt,pem}, **/.env
  • Examples of other patterns: **/.git/**, .git/**, .git/**/*

Details

server.fs.deny can contain patterns matching against files (by default it includes .env, .env.*, *.{crt,pem} as such patterns).
These patterns were able to bypass for files under root by using a combination of slash and dot (/.).

PoC

npm create vite@latest
cd vite-project/
cat "secret" > .env
npm install
npm run dev
curl --request-target /.env/. http://localhost:5173

image
image

CVE-2025-58752

Summary

Any HTML files on the machine were served regardless of the server.fs settings.

Impact

Only apps that match the following conditions are affected:

  • explicitly exposes the Vite dev server to the network (using --host or server.host config option)
  • appType: 'spa' (default) or appType: 'mpa' is used

This vulnerability also affects the preview server. The preview server allowed HTML files not under the output directory to be served.

Details

The serveStaticMiddleware function is in charge of serving static files from the server. It returns the viteServeStaticMiddleware function which runs the needed tests and serves the page. The viteServeStaticMiddleware function checks if the extension of the requested file is ".html". If so, it doesn't serve the page. Instead, the server will go on to the next middlewares, in this case htmlFallbackMiddleware, and then to indexHtmlMiddleware. These middlewares don't perform any test against allow or deny rules, and they don't make sure that the accessed file is in the root directory of the server. They just find the file and send back its contents to the client.

PoC

Execute the following shell commands:

npm  create  vite@latest
cd vite-project/
echo  "secret" > /tmp/secret.html
npm install
npm run dev

Then, in a different shell, run the following command:

curl -v --path-as-is 'http://localhost:5173/../../../../../../../../../../../tmp/secret.html'

The contents of /tmp/secret.html will be returned.

This will also work for HTML files that are in the root directory of the project, but are in the deny list (or not in the allow list). Test that by stopping the running server (CTRL+C), and running the following commands in the server's shell:

echo  'import path from "node:path"; import { defineConfig } from "vite"; export default defineConfig({server: {fs: {deny: [path.resolve(__dirname, "secret_files/*")]}}})'  >  [vite.config.js](http://vite.config.js)
mkdir secret_files
echo "secret txt" > secret_files/secret.txt
echo "secret html" > secret_files/secret.html
npm run dev

Then, in a different shell, run the following command:

curl -v --path-as-is 'http://localhost:5173/secret_files/secret.txt'

You will receive a 403 HTTP Response,  because everything in the secret_files directory is denied.

Now in the same shell run the following command:

curl -v --path-as-is 'http://localhost:5173/secret_files/secret.html'

You will receive the contents of secret_files/secret.html.

CVE-2025-58751

Summary

Files starting with the same name with the public directory were served bypassing the server.fs settings.

Impact

Only apps that match the following conditions are affected:

Details

The servePublicMiddleware function is in charge of serving public files from the server. It returns the viteServePublicMiddleware function which runs the needed tests and serves the page. The viteServePublicMiddleware function checks if the publicFiles variable is defined, and then uses it to determine if the requested page is public. In the case that the publicFiles is undefined, the code will treat the requested page as a public page, and go on with the serving function. publicFiles may be undefined if there is a symbolic link anywhere inside the public directory. In that case, every requested page will be passed to the public serving function. The serving function is based on the sirv library. Vite patches the library to add the possibility to test loading access to pages, but when the public page middleware disables this functionality since public pages are meant to be available always, regardless of whether they are in the allow or deny list.

In the case of public pages, the serving function is provided with the path to the public directory as a root directory. The code of the sirv library uses the join function to get the full path to the requested file. For example, if the public directory is "/www/public", and the requested file is "myfile", the code will join them to the string "/www/public/myfile". The code will then pass this string to the normalize function. Afterwards, the code will use the string's startsWith function to determine whether the created path is within the given directory or not. Only if it is, it will be served.

Since sirv trims the trailing slash of the public directory, the string's startsWith function may return true even if the created path is not within the public directory. For example, if the server's root is at "/www", and the public directory is at "/www/p", if the created path will be "/www/private.txt", the startsWith function will still return true, because the string "/www/private.txt" starts with  "/www/p". To achieve this, the attacker will use ".." to ask for the file "../private.txt". The code will then join it to the "/www/p" string, and will receive "/www/p/../private.txt". Then, the normalize function will return "/www/private.txt", which will then be passed to the startsWith function, which will return true, and the processing of the page will continue without checking the deny list (since this is the public directory middleware which doesn't check that).

PoC

Execute the following shell commands:

npm  create  vite@latest
cd vite-project/
mkdir p
cd p
ln -s a b
cd ..
echo  'import path from "node:path"; import { defineConfig } from "vite"; export default defineConfig({publicDir: path.resolve(__dirname, "p/"), server: {fs: {deny: [path.resolve(__dirname, "private.txt")]}}})' > vite.config.js
echo  "secret" > private.txt
npm install
npm run dev

Then, in a different shell, run the following command:

curl -v --path-as-is 'http://localhost:5173/private.txt'

You will receive a 403 HTTP Response,  because private.txt is denied.

Now in the same shell run the following command:

curl -v --path-as-is 'http://localhost:5173/../private.txt'

You will receive the contents of private.txt.

Related links

CVE-2025-62522

Summary

Files denied by server.fs.deny were sent if the URL ended with \ when the dev server is running on Windows.

Impact

Only apps that match the following conditions are affected:

  • explicitly exposes the Vite dev server to the network (using --host or server.host config option)
  • running the dev server on Windows

Details

server.fs.deny can contain patterns matching against files (by default it includes .env, .env.*, *.{crt,pem} as such patterns). These patterns were able to bypass by using a back slash(\). The root cause is that fs.readFile('/foo.png/') loads /foo.png.

PoC

npm create vite@latest
cd vite-project/
cat "secret" > .env
npm install
npm run dev
curl --request-target /.env\ http://localhost:5173
image

Release Notes

vitejs/vite (vite)

v5.4.21

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.20

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.19

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.18

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.17

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.16

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.15

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.14

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.13

Compare Source

Please refer to CHANGELOG.md for details.

v5.4.12

Compare Source

This version contains a breaking change due to security fixes. See GHSA-vg6x-rcgg-rjx6 for more details.

Please refer to CHANGELOG.md for details.

v5.4.11

Compare Source

Vite 6 is out!

Today, we're taking another big step in Vite's story. The Vite team, contributors, and ecosystem partners are excited to announce the release of the next Vite major:

We want to thank the more than 1K contributors to Vite Core and the maintainers and contributors of Vite plugins, integrations, tools, and translations that have helped us craft this new major. We invite you to get involved and help us improve Vite for the whole ecosystem. Learn more at our Contributing Guide.

⚠ BREAKING CHANGES
  • drop node 21 support in version ranges (#​18729)
  • deps: update dependency dotenv-expand to v12 (#​18697)
  • resolve: allow removing conditions (#​18395)
  • html: support more asset sources (#​11138)
  • remove fs.cachedChecks option (#​18493)
  • proxy bypass with WebSocket (#​18070)
  • css: remove default import in ssr dev (#​17922)
  • lib: use package name for css output file name (#​18488)
  • update to chokidar v4 (#​18453)
  • support file:// resolution (#​18422)
  • deps: update postcss-load-config to v6 (#​15235)
  • css: change default sass api to modern/modern-compiler (#​17937)
  • css: load postcss config within workspace root only (#​18440)
  • default build.cssMinify to 'esbuild' for SSR (#​15637)
  • json: add json.stringify: 'auto' and make that the default (#​18303)
  • bump minimal terser version to 5.16.0 (#​18209)
  • deps: migrate fast-glob to tinyglobby (#​18243)
Features
Bug Fixes
Performance Improvements
Documentation

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@vercel
Copy link

vercel bot commented Apr 4, 2025

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
hellobart Ready Ready Preview Mar 5, 2026 7:50pm

@renovate renovate bot requested a review from bartvdbraak April 4, 2025 23:20
@github-actions
Copy link

github-actions bot commented Apr 4, 2025

⚡️ Lighthouse report

loading

@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 04a7562 to 576c855 Compare April 11, 2025 21:41
@renovate renovate bot changed the title chore(deps): update dependency vite to v5.4.17 [security] chore(deps): update dependency vite to v5.4.18 [security] Apr 11, 2025
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 576c855 to 60e24d0 Compare April 24, 2025 07:00
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 60e24d0 to 741f665 Compare May 1, 2025 01:48
@renovate renovate bot changed the title chore(deps): update dependency vite to v5.4.18 [security] chore(deps): update dependency vite to v5.4.19 [security] May 1, 2025
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 741f665 to 00578ff Compare May 19, 2025 20:07
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 00578ff to 7070c2c Compare May 28, 2025 07:46
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 7070c2c to 545a8a4 Compare June 4, 2025 06:44
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 545a8a4 to 2f0dd24 Compare June 22, 2025 15:10
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 2f0dd24 to 31cce1e Compare July 2, 2025 15:38
@sonarqubecloud
Copy link

sonarqubecloud bot commented Jul 2, 2025

@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 5d272ae to 46633c0 Compare October 21, 2025 00:49
@renovate renovate bot changed the title chore(deps): update dependency vite to v5.4.20 [security] chore(deps): update dependency vite to v5.4.21 [security] Oct 21, 2025
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 46633c0 to f5c7355 Compare November 10, 2025 17:36
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from f5c7355 to 8b4b5fb Compare December 3, 2025 19:02
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 8b4b5fb to 45a6145 Compare December 31, 2025 14:31
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 45a6145 to e2ed802 Compare January 8, 2026 19:56
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from e2ed802 to 4074ff0 Compare January 19, 2026 18:15
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 4074ff0 to 4833e61 Compare January 23, 2026 19:09
@renovate renovate bot changed the title chore(deps): update dependency vite to v5.4.21 [security] chore(deps): update dependency vite to v5.4.21 [security] - autoclosed Feb 2, 2026
@renovate renovate bot closed this Feb 2, 2026
@renovate renovate bot deleted the renovate/npm-vite-vulnerability branch February 2, 2026 17:50
@renovate renovate bot changed the title chore(deps): update dependency vite to v5.4.21 [security] - autoclosed chore(deps): update dependency vite to v5.4.21 [security] Feb 2, 2026
@renovate renovate bot reopened this Feb 2, 2026
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch 2 times, most recently from 4833e61 to 2e977ef Compare February 2, 2026 23:46
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 2e977ef to 1ca6c6c Compare February 12, 2026 16:06
@renovate renovate bot force-pushed the renovate/npm-vite-vulnerability branch from 1ca6c6c to 3e8957b Compare March 5, 2026 19:48
@sonarqubecloud
Copy link

sonarqubecloud bot commented Mar 5, 2026

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants