CVE-2025-58751
Vite middleware may serve files starting with the same name with the public directory
Description
Vite is a frontend tooling framework for JavaScript. Prior to versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20, files starting with the same name with the public directory were served bypassing the `server.fs` settings. Only apps that explicitly expose the Vite dev server to the network (using --host or `server.host` config option), use the public directory feature (enabled by default), and have a symlink in the public directory are affected. Versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20 fix the issue.
INFO
Published Date :
Sept. 8, 2025, 11:15 p.m.
Last Modified :
Sept. 9, 2025, 4:28 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 4.0 | LOW | [email protected] |
Solution
- Update Vite to version 7.1.5 or later.
- Update Vite to version 7.0.7 or later.
- Update Vite to version 6.3.6 or later.
- Update Vite to version 5.4.20 or later.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-58751
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-58751
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-58751
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-58751
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-58751
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Sep. 09, 2025
Action Type Old Value New Value Added Reference https://github.com/vitejs/vite/security/advisories/GHSA-g4jq-h2w9-997c -
New CVE Received by [email protected]
Sep. 08, 2025
Action Type Old Value New Value Added Description Vite is a frontend tooling framework for JavaScript. Prior to versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20, files starting with the same name with the public directory were served bypassing the `server.fs` settings. Only apps that explicitly expose the Vite dev server to the network (using --host or `server.host` config option), use the public directory feature (enabled by default), and have a symlink in the public directory are affected. Versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20 fix the issue. Added CVSS V4.0 AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Added CWE CWE-22 Added CWE CWE-200 Added CWE CWE-284 Added Reference https://github.com/lukeed/sirv/commit/f0113f3f8266328d804ee808f763a3c11f8997eb Added Reference https://github.com/vitejs/vite/commit/09f2b52e8d5907f26602653caf41b3a56692600d Added Reference https://github.com/vitejs/vite/commit/4f1c35bcbb5830290c694aa14b6789e07450f069 Added Reference https://github.com/vitejs/vite/commit/63e2a5d232218f3f8d852056751e609a5367aaec Added Reference https://github.com/vitejs/vite/commit/e11d24008b97d4ca731ecc1a3b95260a6d12e7e0 Added Reference https://github.com/vitejs/vite/security/advisories/GHSA-g4jq-h2w9-997c