{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-24010","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-01-16T17:31:06.457Z","datePublished":"2025-01-20T15:53:30.929Z","dateUpdated":"2025-01-21T14:52:53.680Z"},"containers":{"cna":{"title":"Vite allows any websites to send any requests to the development server and read the response","problemTypes":[{"descriptions":[{"cweId":"CWE-346","lang":"en","description":"CWE-346: Origin Validation Error","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-350","lang":"en","description":"CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-1385","lang":"en","description":"CWE-1385: Missing Origin Validation in WebSockets","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6","tags":["x_refsource_CONFIRM"],"url":"https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6"}],"affected":[{"vendor":"vitejs","product":"vite","versions":[{"version":">= 6.0.0, < 6.0.9","status":"affected"},{"version":">= 5.0.0, < 5.4.12","status":"affected"},{"version":"< 4.5.6","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-01-20T15:53:30.929Z"},"descriptions":[{"lang":"en","value":"Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6."}],"source":{"advisory":"GHSA-vg6x-rcgg-rjx6","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-21T14:52:46.258360Z","id":"CVE-2025-24010","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-21T14:52:53.680Z"}}]}}