CVE-2026-39363

Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, if it is possible to connect to the Vite dev server’s WebSocket without an Origin header, an attacker can invoke fetchModule via the custom WebSocket event vite:invoke and combine file://... with ?raw (or ?inline) to retrieve the contents of arbitrary files on the server as a JavaScript string (e.g., export default "..."). The access control enforced in the HTTP request path (such as server.fs.allow) is not applied to this WebSocket-based execution path. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
cpe:2.3:a:vitejs:vite-plus:*:*:*:*:*:node.js:*:*

History

15 Apr 2026, 20:07

Type Values Removed Values Added
First Time Vitejs
Vitejs vite
Vitejs vite-plus
CPE cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
cpe:2.3:a:vitejs:vite-plus:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/vitejs/vite/security/advisories/GHSA-p9ff-h696-f583 - () https://github.com/vitejs/vite/security/advisories/GHSA-p9ff-h696-f583 - Exploit, Vendor Advisory

08 Apr 2026, 19:25

Type Values Removed Values Added
References () https://github.com/vitejs/vite/security/advisories/GHSA-p9ff-h696-f583 - () https://github.com/vitejs/vite/security/advisories/GHSA-p9ff-h696-f583 -

07 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 20:16

Updated : 2026-04-15 20:07


NVD link : CVE-2026-39363

Mitre link : CVE-2026-39363

CVE.ORG link : CVE-2026-39363


JSON object : View

Products Affected

vitejs

  • vite
  • vite-plus
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-306

Missing Authentication for Critical Function