Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, the dev server’s handling of .map requests for optimized dependencies resolves file paths and calls readFile without restricting ../ segments in the URL. As a result, it is possible to bypass the server.fs.strict allow list and retrieve .map files located outside the project root, provided they can be parsed as valid source map JSON. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5.
References
| Link | Resource |
|---|---|
| https://github.com/vitejs/vite/security/advisories/GHSA-4w7w-66w2-5vf9 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Apr 2026, 19:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/vitejs/vite/security/advisories/GHSA-4w7w-66w2-5vf9 - Exploit, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CPE | cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:* cpe:2.3:a:vitejs:vite-plus:*:*:*:*:*:node.js:*:* |
|
| First Time |
Vitejs
Vitejs vite Vitejs vite-plus |
07 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 20:16
Updated : 2026-04-15 19:58
NVD link : CVE-2026-39365
Mitre link : CVE-2026-39365
CVE.ORG link : CVE-2026-39365
JSON object : View
Products Affected
vitejs
- vite
- vite-plus
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
