Miggo Logo

CVE-2025-24010: Websites were able to send any requests to the development server and read the response in vite

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.0051%
Published
1/21/2025
Updated
2/7/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
vitenpm>= 6.0.0, <= 6.0.86.0.9
vitenpm>= 5.0.0, <= 5.4.115.4.12
vitenpm<= 4.5.54.5.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from three primary issues:

  1. WebSocket Origin Validation: The explicit code reference in ws.ts (lines 145-157) shows no Origin header checks during WebSocket connections, directly enabling CSWSH.
  2. CORS Configuration: The default server.cors setting (true) applied a permissive * origin via middleware, allowing cross-origin fetches.
  3. Host Header Validation: The HTTP server (in index.ts) did not enforce allowed hosts, permitting DNS rebinding attacks. While no direct code snippet is provided, the mitigation (introducing server.allowedHosts) implies the absence of prior validation logic. Confidence levels vary: ws.ts is explicitly documented (high), while CORS and Host validation issues are inferred from configuration defaults and mitigation steps (medium).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Vit* *llow** *ny w**sit*s to s*n* *ny r*qu*sts to t** **v*lopm*nt s*rv*r *n* r*** t** r*spons* *u* to ****ult *ORS s*ttin*s *n* l**k o* v*li**tion on t** Ori*in *****r *or W**So*k*t *onn**tions. > [!W*RNIN*] > T*is vuln*r**ility *v*n *pp

Reasoning

T** vuln*r**ility st*ms *rom t*r** prim*ry issu*s: *. **W**So*k*t Ori*in V*li**tion**: T** *xpli*it *o** r***r*n** in `ws.ts` (lin*s ***-***) s*ows no Ori*in *****r ****ks *urin* W**So*k*t *onn**tions, *ir**tly *n**lin* *SWS*. *. ***ORS *on*i*ur*tion