CVE-2025-24360:
Opening a malicious website while running a Nuxt dev server could allow read-only access to code
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.27512%
CWE
Published
1/27/2025
Updated
1/27/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
@nuxt/vite-builder | npm | >= 3.8.1, < 3.15.3 | 3.15.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Nuxt's custom CORS handler overriding Vite's patched CORS implementation. The key vulnerable functions are: 1) The Vite client middleware handler that used h3's appendCorsHeaders with wildcard origins, visible in client.ts lines 257-263 pre-patch. 2) The Vite Node server middleware that exposed internal endpoints without origin validation. The commit 7eeb910 replaced the wildcard CORS implementation with origin restrictions and proper h3 handleCors usage, confirming these were the vulnerable points. The medium confidence for vite-node.ts stems from advisory notes about potential exploitation despite lack of explicit PoC for module IDs.