Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.
CVSS
No CVSS.
References
Configurations
No configuration.
History
04 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/nestjs/nest/security/advisories/GHSA-85cg-cmq5-qjm7 - |
04 Aug 2025, 15:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Aug 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-02 00:15
Updated : 2025-08-04 16:15
NVD link : CVE-2025-54782
Mitre link : CVE-2025-54782
CVE.ORG link : CVE-2025-54782
JSON object : View
Products Affected
No product.