Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
{
"cna_assigner": "GitHub_M",
"cwe_ids": [
"CWE-200",
"CWE-284"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/31xxx/CVE-2025-31125.json"
}{
"versions": [
{
"introduced": "6.2.0"
},
{
"fixed": "6.2.4"
}
]
}{
"versions": [
{
"introduced": "6.1.0"
},
{
"fixed": "6.1.3"
}
]
}{
"versions": [
{
"introduced": "6.0.0"
},
{
"fixed": "6.0.13"
}
]
}