CVE-2025-67489: CWE-94: Improper Control of Generation of Code ('Code Injection') in vitejs vite-plugin-react
@vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Versions 0.5.5 and below are vulnerable to arbitrary remote code execution on the development server through unsafe dynamic imports in server function APIs (loadServerAction, decodeReply, decodeAction) when integrated into RSC applications that expose server function endpoints. Attackers with network access to the development server can read/modify files, exfiltrate sensitive data (source code, environment variables, credentials), or pivot to other internal services. While this affects development servers only, the risk increases when using vite --host to expose the server on all network interfaces. This issue is fixed in version 0.5.6.
AI Analysis
Technical Summary
CVE-2025-67489 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting vite-plugin-react versions below 0.5.6. This plugin provides React Server Components (RSC) support for the Vite build tool. The vulnerability stems from unsafe dynamic imports within server function APIs such as loadServerAction, decodeReply, and decodeAction. These APIs are used in RSC applications that expose server function endpoints on the development server. An attacker with network access to the development server can exploit this flaw to perform arbitrary remote code execution (RCE) without requiring authentication or user interaction. This allows the attacker to read or modify files on the development server, exfiltrate sensitive data including source code, environment variables, and credentials, and potentially pivot to other internal services. The vulnerability is particularly dangerous when the development server is launched with the vite --host option, which exposes the server on all network interfaces, increasing the attack surface. Although the vulnerability affects only development servers and not production environments, the exposure of sensitive intellectual property and credentials can have significant downstream consequences. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The issue was publicly disclosed on December 9, 2025, and fixed in vite-plugin-react version 0.5.6. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to development environments that use vite-plugin-react versions prior to 0.5.6. The ability to execute arbitrary code remotely on development servers can lead to theft of proprietary source code, exposure of environment variables containing secrets, and unauthorized modification of development assets. This can result in intellectual property loss, compromise of credentials that may be reused in production environments, and potential lateral movement to internal services, escalating the breach impact. Organizations with remote or distributed development teams who expose development servers on public or internal networks using the vite --host option are at heightened risk. The impact extends beyond confidentiality to integrity and availability, as attackers could alter code or disrupt development workflows. Given the critical CVSS score and the ease of exploitation without authentication, European software development companies, technology firms, and any enterprises relying on Vite-based React development tools must prioritize remediation to prevent potential breaches and intellectual property theft.
Mitigation Recommendations
1. Immediately upgrade vite-plugin-react to version 0.5.6 or later to apply the official patch that fixes this vulnerability. 2. Avoid exposing development servers to untrusted networks; do not use the vite --host option to bind the development server to all network interfaces unless absolutely necessary and secured. 3. Restrict network access to development servers using firewall rules or VPNs to limit exposure only to trusted developers. 4. Implement network segmentation to isolate development environments from production and sensitive internal services to reduce lateral movement risk. 5. Regularly audit development environments for unauthorized access or suspicious activity. 6. Educate development teams about the risks of exposing development servers publicly and enforce secure development environment policies. 7. Consider using ephemeral or containerized development environments that can be quickly rebuilt to reduce persistent attack surfaces. 8. Monitor for updates from the vitejs project and subscribe to security advisories to stay informed about future vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2025-67489: CWE-94: Improper Control of Generation of Code ('Code Injection') in vitejs vite-plugin-react
Description
@vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Versions 0.5.5 and below are vulnerable to arbitrary remote code execution on the development server through unsafe dynamic imports in server function APIs (loadServerAction, decodeReply, decodeAction) when integrated into RSC applications that expose server function endpoints. Attackers with network access to the development server can read/modify files, exfiltrate sensitive data (source code, environment variables, credentials), or pivot to other internal services. While this affects development servers only, the risk increases when using vite --host to expose the server on all network interfaces. This issue is fixed in version 0.5.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-67489 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting vite-plugin-react versions below 0.5.6. This plugin provides React Server Components (RSC) support for the Vite build tool. The vulnerability stems from unsafe dynamic imports within server function APIs such as loadServerAction, decodeReply, and decodeAction. These APIs are used in RSC applications that expose server function endpoints on the development server. An attacker with network access to the development server can exploit this flaw to perform arbitrary remote code execution (RCE) without requiring authentication or user interaction. This allows the attacker to read or modify files on the development server, exfiltrate sensitive data including source code, environment variables, and credentials, and potentially pivot to other internal services. The vulnerability is particularly dangerous when the development server is launched with the vite --host option, which exposes the server on all network interfaces, increasing the attack surface. Although the vulnerability affects only development servers and not production environments, the exposure of sensitive intellectual property and credentials can have significant downstream consequences. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The issue was publicly disclosed on December 9, 2025, and fixed in vite-plugin-react version 0.5.6. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to development environments that use vite-plugin-react versions prior to 0.5.6. The ability to execute arbitrary code remotely on development servers can lead to theft of proprietary source code, exposure of environment variables containing secrets, and unauthorized modification of development assets. This can result in intellectual property loss, compromise of credentials that may be reused in production environments, and potential lateral movement to internal services, escalating the breach impact. Organizations with remote or distributed development teams who expose development servers on public or internal networks using the vite --host option are at heightened risk. The impact extends beyond confidentiality to integrity and availability, as attackers could alter code or disrupt development workflows. Given the critical CVSS score and the ease of exploitation without authentication, European software development companies, technology firms, and any enterprises relying on Vite-based React development tools must prioritize remediation to prevent potential breaches and intellectual property theft.
Mitigation Recommendations
1. Immediately upgrade vite-plugin-react to version 0.5.6 or later to apply the official patch that fixes this vulnerability. 2. Avoid exposing development servers to untrusted networks; do not use the vite --host option to bind the development server to all network interfaces unless absolutely necessary and secured. 3. Restrict network access to development servers using firewall rules or VPNs to limit exposure only to trusted developers. 4. Implement network segmentation to isolate development environments from production and sensitive internal services to reduce lateral movement risk. 5. Regularly audit development environments for unauthorized access or suspicious activity. 6. Educate development teams about the risks of exposing development servers publicly and enforce secure development environment policies. 7. Consider using ephemeral or containerized development environments that can be quickly rebuilt to reduce persistent attack surfaces. 8. Monitor for updates from the vitejs project and subscribe to security advisories to stay informed about future vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-08T18:02:08.847Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693890dd52fe50f9a48c9bdf
Added to database: 12/9/2025, 9:13:01 PM
Last enriched: 12/9/2025, 9:27:50 PM
Last updated: 12/11/2025, 6:34:37 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.