CVE-2025-68155

7.5 HIGH

📋 TL;DR

This vulnerability in @vitejs/plugin-rsc allows unauthenticated attackers to read arbitrary files accessible to the Node.js process during development mode. Attackers can exploit this by sending crafted HTTP requests with file:// URLs to the /__vite_rsc_findSourceMapURL endpoint. Only developers using affected versions of @vitejs/plugin-rsc in development environments are impacted.

💻 Affected Systems

Products:
  • @vitejs/plugin-rsc
Versions: All versions prior to 0.5.8
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects development mode when using React Server Components with Vite

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of development environment including source code, configuration files, secrets, and credentials stored in files accessible to the Node.js process.

🟠

Likely Case

Exfiltration of sensitive development files including API keys, database credentials, and proprietary source code.

🟢

If Mitigated

Limited impact if development servers are isolated from production data and sensitive files are properly secured.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request with file:// URL parameter required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.5.8

Vendor Advisory: https://github.com/vitejs/vite-plugin-react/security/advisories/GHSA-g239-q96q-x4qm

Restart Required: Yes

Instructions:

1. Update package.json to specify @vitejs/plugin-rsc version 0.5.8 or higher. 2. Run npm update @vitejs/plugin-rsc or yarn upgrade @vitejs/plugin-rsc. 3. Restart development server.

🔧 Temporary Workarounds

Disable development server exposure

all

Ensure development servers are not exposed to untrusted networks

Use localhost binding only: vite --host localhost
Configure firewall to block external access to dev port

Network isolation

all

Run development environment in isolated network segment

Use Docker with network isolation
Configure VPN for development access only

🧯 If You Can't Patch

  • Restrict development server access to localhost only
  • Implement network segmentation to isolate development environments

🔍 How to Verify

Check if Vulnerable:

Check package.json for @vitejs/plugin-rsc version <0.5.8 and verify development server is running

Check Version:

npm list @vitejs/plugin-rsc

Verify Fix Applied:

Confirm @vitejs/plugin-rsc version is 0.5.8 or higher in package.json and node_modules

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /__vite_rsc_findSourceMapURL with file:// parameters
  • Unusual file read operations from Node.js process

Network Indicators:

  • HTTP GET requests to development port with file:// URLs in query parameters

SIEM Query:

http.url:"*__vite_rsc_findSourceMapURL*" AND http.query:"*file://*"

🔗 References

📤 Share & Export