chore(deps): update dependency vite to v5.4.19 [security]
This MR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| vite (source) | devDependencies | patch | 5.4.18 -> 5.4.19 |
Vite's server.fs.deny bypassed with /. for files under project root
CVE-2025-46565 / GHSA-859w-5945-r5v3
More information
Details
Summary
The contents of files in the project root that are denied by a file matching pattern can be returned to the browser.
Impact
Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.
Only files that are under project root and are denied by a file matching pattern can be bypassed.
- Examples of file matching patterns:
.env,.env.*,*.{crt,pem},**/.env - Examples of other patterns:
**/.git/**,.git/**,.git/**/*
Details
server.fs.deny can contain patterns matching against files (by default it includes .env, .env.*, *.{crt,pem} as such patterns).
These patterns were able to bypass for files under root by using a combination of slash and dot (/.).
PoC
npm create vite@latest
cd vite-project/
cat "secret" > .env
npm install
npm run dev
curl --request-target /.env/. http://localhost:5173
Severity
- CVSS Score: Unknown
- Vector String:
CVSS:4.0/AV:N/AC:L/AT:P/MR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
References
- https://github.com/vitejs/vite/security/advisories/GHSA-859w-5945-r5v3
- https://nvd.nist.gov/vuln/detail/CVE-2025-46565
- https://github.com/vitejs/vite/commit/c22c43de612eebb6c182dd67850c24e4fab8cacb
- https://github.com/vitejs/vite
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
Configuration
-
If you want to rebase/retry this MR, check this box
This MR has been generated by Renovate Bot.