Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
Package
Affected versions
>= 6.2.0, < 6.2.4
>= 6.1.0, < 6.1.3
>= 6.0.0, < 6.0.13
>= 5.0.0, < 5.4.16
< 4.5.11
Patched versions
6.2.4
6.1.3
6.0.13
5.4.16
4.5.11
Description
Published by the National Vulnerability Database
Mar 31, 2025
Published to the GitHub Advisory Database
Mar 31, 2025
Reviewed
Mar 31, 2025
Last updated
Mar 31, 2025
Summary
The contents of arbitrary files can be returned to the browser.
Impact
Only apps explicitly exposing the Vite dev server to the network (using
--host
orserver.host
config option) are affected.Details
?inline&import
(originally reported as?import&?inline=1.wasm?init
)?raw?import
/@fs/
isn't needed to reproduce the issue for files inside the project root.PoC
Original report (check details above for simplified cases):
The ?import&?inline=1.wasm?init ending allows attackers to read arbitrary files and returns the file content if it exists. Base64 decoding needs to be performed twice
Example full URL
http://localhost:5173/@fs/C:/windows/win.ini?import&?inline=1.wasm?init
References