`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.","datePublished":"2023-12-04T23:03:30.752Z","dateModified":"2025-08-02T02:38:46.230Z","url":"https://radar.offseq.com/threat/cve-2023-49293-cwe-79-improper-neutralization-of-i-15a37733","author":{"@type":"Organization","name":"OffSeq Threat Intelligence","url":"https://radar.offseq.com"},"publisher":{"@type":"Organization","name":"OffSeq","logo":{"@type":"ImageObject","url":"https://radar.offseq.com/favicon.png"}},"mainEntityOfPage":{"@type":"WebPage","@id":"https://radar.offseq.com/threat/cve-2023-49293-cwe-79-improper-neutralization-of-i-15a37733"},"identifier":"CVE-2023-49293","contentRating":"MEDIUM","keywords":"cve,cve-2023-49293,cwe-79"}
Skip to main content

CVE-2023-49293: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vitejs vite

Medium
VulnerabilityCVE-2023-49293cvecve-2023-49293cwe-79
Published: Mon Dec 04 2023 (12/04/2023, 23:03:30 UTC)
Source: CVE Database V5
Vendor/Project: vitejs
Product: vite

Description

Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:12:43 UTC

Technical Analysis

CVE-2023-49293 is a medium-severity Cross-site Scripting (XSS) vulnerability affecting the Vite frontend development framework, specifically versions >=4.4.0 and <4.4.12, version 4.5.0, and versions >=5.0.0 and <5.0.5. Vite is widely used for building modern web applications, providing fast development servers and build tools. The vulnerability arises when the Vite development server's HTML transformation function, server.transformIndexHtml, is invoked manually and the original request URL is passed without sanitization. If the HTML being transformed contains inline module scripts (i.e., <script type="module">...</script>), an attacker can craft a malicious URL with a specially crafted query string that injects arbitrary HTML into the transformed output. This injection occurs because the input is not properly neutralized during web page generation, corresponding to CWE-79. The attack scenario requires that the application uses the appType: 'custom' configuration and the default Vite HTML middleware, and that the HTML entry point contains inline scripts. Exploitation requires a user to click on a malicious URL while the Vite development server is running, meaning this vulnerability primarily affects development environments rather than production deployments. Importantly, restricted files are not exposed, limiting the scope of data leakage. The vulnerability has been addressed in Vite versions 5.0.5, 4.5.1, and 4.4.12. No known exploits are currently observed in the wild, and no workarounds exist other than upgrading. The CVSS 3.1 base score is 6.1, reflecting a network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change with low confidentiality and integrity impacts but no availability impact.

Potential Impact

For European organizations, the primary impact of CVE-2023-49293 lies in the development phase of web applications using Vite. Since the vulnerability requires the Vite development server to be running and a user to click a malicious URL, the risk to production environments is minimal. However, if developers or testers in European companies use vulnerable Vite versions with the specified configurations, attackers could execute arbitrary HTML/JavaScript in their browsers, potentially leading to session hijacking, credential theft, or injection of malicious scripts into development previews. This could facilitate further attacks on internal systems or leak sensitive development information. Organizations with web development teams using Vite should be aware that this vulnerability could be exploited in internal networks or via phishing campaigns targeting developers. The impact on confidentiality and integrity is moderate, while availability is unaffected. Since no restricted files are exposed, the risk of direct data exfiltration is limited. Nevertheless, exploitation could undermine trust in development environments and delay project timelines due to remediation efforts.

Mitigation Recommendations

The most effective mitigation is to upgrade Vite to a patched version: 5.0.5, 4.5.1, or 4.4.12 or later. Organizations should enforce strict version control and dependency management to ensure vulnerable versions are not used. Additionally, developers should avoid using appType: 'custom' with the default Vite HTML middleware if possible or sanitize any user-controllable inputs passed to server.transformIndexHtml. Implementing Content Security Policy (CSP) headers during development can help mitigate the impact of injected scripts. Educating developers about the risks of clicking untrusted URLs while running development servers is also important. Network segmentation can limit exposure of development servers to untrusted networks. Monitoring for suspicious URL access patterns and anomalous script injections in development environments can provide early detection. Since no workarounds exist, prioritizing patching is critical. Finally, organizations should review their internal development workflows to minimize exposure to such vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2023-11-24T16:45:24.313Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386826182aa0cae2801b7e

Added to database: 5/29/2025, 1:59:02 PM

Last enriched: 7/8/2025, 3:12:43 AM

Last updated: 8/2/2025, 2:38:46 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats