CVE-2025-24963

Published Feb 4, 2025

Last updated 18 days ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2025-24963 is a directory traversal vulnerability found in the Vitest JavaScript testing framework. The vulnerability exists in the `__screenshot-error` handler within the browser mode HTTP server. This flaw allows access to arbitrary files on the server due to improper pathname restrictions. Vitest is a Vite-powered testing framework. Exploitation of CVE-2025-24963 could permit unauthorized access to sensitive files on the affected server. Users of Vitest are encouraged to review available information and consider necessary actions.

Description
Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handler from remote to get the content of arbitrary files.This `__screenshot-error` handler on the browser mode HTTP server responds any file on the file system. This code was added by commit `2d62051`. Users explicitly exposing the browser mode server to the network by `browser.api.host: true` may get any files exposed. This issue has been addressed in versions 2.1.9 and 3.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Source
security-advisories@github.com
NVD status
Received

Risk scores

CVSS 3.1

Type
Secondary
Base score
5.9
Impact score
3.6
Exploitability score
2.2
Vector string
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
MEDIUM

Weaknesses

security-advisories@github.com
CWE-22

Social media

Hype score
Not currently trending