Miggo Logo

CVE-2025-30208:
Vite bypasses server.fs.deny when using ?raw??

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.98741%
Published
3/25/2025
Updated
3/25/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
vitenpm>= 6.2.0, < 6.2.36.2.3
vitenpm>= 6.1.0, < 6.1.26.1.2
vitenpm>= 6.0.0, < 6.0.126.0.12
vitenpm>= 5.0.0, < 5.4.155.4.15
vitenpm< 4.5.104.5.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The transformMiddleware function is identified as vulnerable because the patch directly modifies its logic to correctly handle URLs with trailing query separators, fixing the bypass of server.fs.deny.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** *ont*nts o* *r*itr*ry *il*s **n ** r*turn** to t** *rows*r. ### Imp**t Only *pps *xpli*itly *xposin* t** Vit* **v s*rv*r to t** n*twork (usin* `--*ost` or [`s*rv*r.*ost` *on*i* option](*ttps://vit*js.**v/*on*i*/s*rv*r-options.*tml#s*

Reasoning

T** `tr*ns*ormMi**l*w*r*` *un*tion is i**nti*i** *s vuln*r**l* ****us* t** p*t** *ir**tly mo*i*i*s its lo*i* to *orr**tly **n*l* URLs wit* tr*ilin* qu*ry s*p*r*tors, *ixin* t** *yp*ss o* `s*rv*r.*s.**ny`.