CVE-2025-67489: CWE-94: Improper Control of Generation of Code ('Code Injection') in vitejs vite-plugin-react
@vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Versions 0.5.5 and below are vulnerable to arbitrary remote code execution on the development server through unsafe dynamic imports in server function APIs (loadServerAction, decodeReply, decodeAction) when integrated into RSC applications that expose server function endpoints. Attackers with network access to the development server can read/modify files, exfiltrate sensitive data (source code, environment variables, credentials), or pivot to other internal services. While this affects development servers only, the risk increases when using vite --host to expose the server on all network interfaces. This issue is fixed in version 0.5.6.
AI Analysis
Technical Summary
CVE-2025-67489 is a critical vulnerability in the vite-plugin-react package, specifically in versions 0.5.5 and below, which provide React Server Components (RSC) support for the Vite development environment. The vulnerability stems from improper control over dynamic imports within server function APIs such as loadServerAction, decodeReply, and decodeAction. These APIs are used in RSC applications to expose server function endpoints. Due to unsafe dynamic import handling, an attacker with network access to the development server can inject arbitrary code remotely, leading to remote code execution (RCE). This allows the attacker to read or modify files on the development server, exfiltrate sensitive information including source code, environment variables, and credentials, and potentially pivot to other internal services within the network. The risk is heightened when developers use the vite --host option, which exposes the development server on all network interfaces, making it accessible beyond localhost. While the vulnerability affects only development servers and not production builds, the exposure of sensitive development assets and the possibility of lateral movement make this a critical security issue. The vulnerability is classified under CWE-94, indicating improper control over code generation, and has been assigned a CVSS v3.1 score of 9.8, reflecting its critical impact and ease of exploitation without authentication or user interaction. The issue was publicly disclosed on December 9, 2025, and fixed in vite-plugin-react version 0.5.6. No known exploits have been reported in the wild at the time of disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in development environments where vite-plugin-react is used for React Server Components. The exposure of development servers to internal or external networks can lead to unauthorized remote code execution, resulting in the compromise of source code, environment variables, and credentials. This can lead to intellectual property theft, leakage of sensitive configuration data, and potential compromise of downstream production systems if attackers pivot from the development environment. Organizations with distributed development teams or those using cloud-based development environments that expose dev servers externally are particularly at risk. The impact extends beyond confidentiality to integrity and availability, as attackers could modify code or disrupt development workflows. Given the critical CVSS score, exploitation could lead to full system compromise of the development server, undermining trust in the software supply chain and increasing the risk of supply chain attacks. The vulnerability also raises compliance concerns under European data protection regulations if sensitive personal data or credentials are exposed.
Mitigation Recommendations
European organizations should immediately upgrade vite-plugin-react to version 0.5.6 or later to remediate the vulnerability. Development servers should not be exposed to external networks; avoid using the vite --host option to bind the server to all network interfaces unless strictly necessary and secured. Implement network segmentation and firewall rules to restrict access to development servers to trusted internal IP addresses only. Use VPNs or secure tunnels for remote development access instead of exposing dev servers publicly. Regularly audit development environments for exposed services and monitor network traffic for unusual access patterns. Employ strict access controls and multi-factor authentication for developer machines and environments. Additionally, review and sanitize any dynamic import usage in custom server functions to prevent unsafe code execution. Incorporate security scanning tools into the CI/CD pipeline to detect vulnerable dependencies and enforce timely patching. Finally, educate development teams about the risks of exposing development servers and best practices for secure development.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2025-67489: CWE-94: Improper Control of Generation of Code ('Code Injection') in vitejs vite-plugin-react
Description
@vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Versions 0.5.5 and below are vulnerable to arbitrary remote code execution on the development server through unsafe dynamic imports in server function APIs (loadServerAction, decodeReply, decodeAction) when integrated into RSC applications that expose server function endpoints. Attackers with network access to the development server can read/modify files, exfiltrate sensitive data (source code, environment variables, credentials), or pivot to other internal services. While this affects development servers only, the risk increases when using vite --host to expose the server on all network interfaces. This issue is fixed in version 0.5.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-67489 is a critical vulnerability in the vite-plugin-react package, specifically in versions 0.5.5 and below, which provide React Server Components (RSC) support for the Vite development environment. The vulnerability stems from improper control over dynamic imports within server function APIs such as loadServerAction, decodeReply, and decodeAction. These APIs are used in RSC applications to expose server function endpoints. Due to unsafe dynamic import handling, an attacker with network access to the development server can inject arbitrary code remotely, leading to remote code execution (RCE). This allows the attacker to read or modify files on the development server, exfiltrate sensitive information including source code, environment variables, and credentials, and potentially pivot to other internal services within the network. The risk is heightened when developers use the vite --host option, which exposes the development server on all network interfaces, making it accessible beyond localhost. While the vulnerability affects only development servers and not production builds, the exposure of sensitive development assets and the possibility of lateral movement make this a critical security issue. The vulnerability is classified under CWE-94, indicating improper control over code generation, and has been assigned a CVSS v3.1 score of 9.8, reflecting its critical impact and ease of exploitation without authentication or user interaction. The issue was publicly disclosed on December 9, 2025, and fixed in vite-plugin-react version 0.5.6. No known exploits have been reported in the wild at the time of disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in development environments where vite-plugin-react is used for React Server Components. The exposure of development servers to internal or external networks can lead to unauthorized remote code execution, resulting in the compromise of source code, environment variables, and credentials. This can lead to intellectual property theft, leakage of sensitive configuration data, and potential compromise of downstream production systems if attackers pivot from the development environment. Organizations with distributed development teams or those using cloud-based development environments that expose dev servers externally are particularly at risk. The impact extends beyond confidentiality to integrity and availability, as attackers could modify code or disrupt development workflows. Given the critical CVSS score, exploitation could lead to full system compromise of the development server, undermining trust in the software supply chain and increasing the risk of supply chain attacks. The vulnerability also raises compliance concerns under European data protection regulations if sensitive personal data or credentials are exposed.
Mitigation Recommendations
European organizations should immediately upgrade vite-plugin-react to version 0.5.6 or later to remediate the vulnerability. Development servers should not be exposed to external networks; avoid using the vite --host option to bind the server to all network interfaces unless strictly necessary and secured. Implement network segmentation and firewall rules to restrict access to development servers to trusted internal IP addresses only. Use VPNs or secure tunnels for remote development access instead of exposing dev servers publicly. Regularly audit development environments for exposed services and monitor network traffic for unusual access patterns. Employ strict access controls and multi-factor authentication for developer machines and environments. Additionally, review and sanitize any dynamic import usage in custom server functions to prevent unsafe code execution. Incorporate security scanning tools into the CI/CD pipeline to detect vulnerable dependencies and enforce timely patching. Finally, educate development teams about the risks of exposing development servers and best practices for secure development.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-08T18:02:08.847Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693890dd52fe50f9a48c9bdf
Added to database: 12/9/2025, 9:13:01 PM
Last enriched: 12/16/2025, 10:11:14 PM
Last updated: 2/7/2026, 12:04:40 AM
Views: 263
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.