Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-23413 @nestjs/devtools-integration: CSRF to Sandbox Escape Allows for RCE against JS Developers
Github GHSA Github GHSA GHSA-85cg-cmq5-qjm7 @nestjs/devtools-integration: CSRF to Sandbox Escape Allows for RCE against JS Developers
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 09 Oct 2025 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nestjs:devtools-integration:*:*:*:*:*:node.js:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 05 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Nestjs
Nestjs devtools-integration
Vendors & Products Nestjs
Nestjs devtools-integration

Mon, 04 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 02 Aug 2025 00:00:00 +0000

Type Values Removed Values Added
Description Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.
Title @nestjs/devtools-integration's CSRF to Sandbox Escape Allows for RCE against JS Developers
Weaknesses CWE-352
CWE-77
CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-08-04T15:23:30.116Z

Reserved: 2025-07-29T16:50:28.391Z

Link: CVE-2025-54782

cve-icon Vulnrichment

Updated: 2025-08-04T15:23:18.309Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-02T00:15:25.953

Modified: 2025-10-09T17:31:16.827

Link: CVE-2025-54782

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-05T11:39:04Z