Description
Vite is a frontend tooling framework for JavaScript. From 7.1.0 to before 7.3.2 and 8.0.5, on the Vite dev server, files that should be blocked by server.fs.deny (e.g., .env, *.crt) can be retrieved with HTTP 200 responses when query parameters such as ?raw, ?import&raw, or ?import&url&inline are appended. This vulnerability is fixed in 7.3.2 and 8.0.5.
Published: 2026-04-07
Score: 8.2 High
EPSS: 3.6% Low
KEV: No
Impact: File Disclosure
Action: Immediate Patch
AI Analysis

Impact

Vite’s development server is vulnerable to a configuration bypass that allows unauthorized reading of files protected by the server.fs.deny setting. By appending query parameters such as ?raw, ?import&raw or ?import&url&inline to an HTTP request, a client receives an HTTP 200 response containing the contents of files that should otherwise be blocked, including environment files and certificate files. This vulnerability maps to multiple improper access control weaknesses, specifically CWE‑180 and CWE‑284, and represents an undocumented security risk (CWE‑472).

Affected Systems

The flaw affects the open-source Vite framework and its vite‑plus variant. It is present in all releases from 7.1.0 up to, but not including, 7.3.2 and from 8.0.0 up to, but not including, 8.0.5. Upgrading to version 7.3.2 or later, or 8.0.5 or later, removes the bypass.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity vulnerability. EPSS score is 5%, indicating a moderate probability of exploitation, and the flaw is not listed in CISA’s KEV catalog. Based on the description, the attack vector is inferred to be remote; an adversary must be able to send HTTP requests to a Vite dev server exposed over a network. Once the server is reachable, the exploit is straightforward and does not require additional privileges beyond the ability to construct URLs with the relevant query parameters. Successful exploitation results in the disclosure of sensitive configuration information and private keys, jeopardizing confidentiality of the development environment and potentially the production environment if the same files are used. The impact is limited to the host running the dev server, but the compromised data could be leveraged for further attacks.

Generated by OpenCVE AI on April 17, 2026 at 09:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vite to version 7.3.2 or later, or to 8.0.5 or later; the patch removes the file‑deny bypass.
  • If an upgrade is not immediately possible, bind the Vite dev server to localhost or a secured internal network so external actors cannot reach it.
  • Ensure the development server is disabled in production environments, or replace it with a production‑ready static file server to prevent accidental exposure.

Generated by OpenCVE AI on April 17, 2026 at 09:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v2wj-q39q-566r Vite: `server.fs.deny` bypassed with queries
History

Thu, 30 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Voidzero
Voidzero vite\+
CPEs cpe:2.3:a:vitejs:vite-plus:*:*:*:*:*:node.js:*:* cpe:2.3:a:voidzero:vite\+:*:*:*:*:*:node.js:*:*
Vendors & Products Voidzero
Voidzero vite\+

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:vitejs:vite-plus:*:*:*:*:*:node.js:*:*
cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Vitejs
Vitejs vite
Vitejs vite-plus
Vendors & Products Vitejs
Vitejs vite
Vitejs vite-plus

Wed, 08 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-472
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

threat_severity

Important


Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Vite is a frontend tooling framework for JavaScript. From 7.1.0 to before 7.3.2 and 8.0.5, on the Vite dev server, files that should be blocked by server.fs.deny (e.g., .env, *.crt) can be retrieved with HTTP 200 responses when query parameters such as ?raw, ?import&raw, or ?import&url&inline are appended. This vulnerability is fixed in 7.3.2 and 8.0.5.
Title Vite has a `server.fs.deny` bypass with queries
Weaknesses CWE-180
CWE-284
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T20:01:56.564Z

Reserved: 2026-04-06T21:29:17.349Z

Link: CVE-2026-39364

cve-icon Vulnrichment

Updated: 2026-04-07T20:01:52.997Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T20:16:30.170

Modified: 2026-04-30T18:34:57.303

Link: CVE-2026-39364

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-07T19:12:47Z

Links: CVE-2026-39364 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T10:00:03Z

Weaknesses