CVE-2025-68155
Description
@vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Prior to version 0.5.8, the `/__vite_rsc_findSourceMapURL` endpoint in `@vitejs/plugin-rsc` allows unauthenticated arbitrary file read during development mode. An attacker can read any file accessible to the Node.js process by sending a crafted HTTP request with a `file://` URL in the `filename` query parameter. Version 0.5.8 fixes the issue.
CWE
- CWE-22 — CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-73 — CWE-73: External Control of File Name or Path
Affected
- vitejs / vite-plugin-react — v=< 0.5.8 [affected]
CVSS
- 3.1 score=7.5 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References
- https://github.com/vitejs/vite-plugin-react/security/advisories/GHSA-g239-q96q-x4qm x_refsource_CONFIRM
- https://github.com/facebook/react/pull/29708 x_refsource_MISC
- https://github.com/facebook/react/pull/30741 x_refsource_MISC
- https://github.com/vitejs/vite-plugin-react/commit/582fba0b9a52b13fcff6beaaa3bfbd532bc5359d x_refsource_MISC
Source
cvelistV5-main/cves/2025/68xxx/CVE-2025-68155.json