Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67489: CWE-94: Improper Control of Generation of Code ('Code Injection') in vitejs vite-plugin-react

0
Critical
VulnerabilityCVE-2025-67489cvecve-2025-67489cwe-94
Published: Tue Dec 09 2025 (12/09/2025, 20:54:23 UTC)
Source: CVE Database V5
Vendor/Project: vitejs
Product: vite-plugin-react

Description

@vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Versions 0.5.5 and below are vulnerable to arbitrary remote code execution on the development server through unsafe dynamic imports in server function APIs (loadServerAction, decodeReply, decodeAction) when integrated into RSC applications that expose server function endpoints. Attackers with network access to the development server can read/modify files, exfiltrate sensitive data (source code, environment variables, credentials), or pivot to other internal services. While this affects development servers only, the risk increases when using vite --host to expose the server on all network interfaces. This issue is fixed in version 0.5.6.

AI-Powered Analysis

AILast updated: 12/16/2025, 22:11:14 UTC

Technical Analysis

CVE-2025-67489 is a critical vulnerability in the vite-plugin-react package, specifically in versions 0.5.5 and below, which provide React Server Components (RSC) support for the Vite development environment. The vulnerability stems from improper control over dynamic imports within server function APIs such as loadServerAction, decodeReply, and decodeAction. These APIs are used in RSC applications to expose server function endpoints. Due to unsafe dynamic import handling, an attacker with network access to the development server can inject arbitrary code remotely, leading to remote code execution (RCE). This allows the attacker to read or modify files on the development server, exfiltrate sensitive information including source code, environment variables, and credentials, and potentially pivot to other internal services within the network. The risk is heightened when developers use the vite --host option, which exposes the development server on all network interfaces, making it accessible beyond localhost. While the vulnerability affects only development servers and not production builds, the exposure of sensitive development assets and the possibility of lateral movement make this a critical security issue. The vulnerability is classified under CWE-94, indicating improper control over code generation, and has been assigned a CVSS v3.1 score of 9.8, reflecting its critical impact and ease of exploitation without authentication or user interaction. The issue was publicly disclosed on December 9, 2025, and fixed in vite-plugin-react version 0.5.6. No known exploits have been reported in the wild at the time of disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in development environments where vite-plugin-react is used for React Server Components. The exposure of development servers to internal or external networks can lead to unauthorized remote code execution, resulting in the compromise of source code, environment variables, and credentials. This can lead to intellectual property theft, leakage of sensitive configuration data, and potential compromise of downstream production systems if attackers pivot from the development environment. Organizations with distributed development teams or those using cloud-based development environments that expose dev servers externally are particularly at risk. The impact extends beyond confidentiality to integrity and availability, as attackers could modify code or disrupt development workflows. Given the critical CVSS score, exploitation could lead to full system compromise of the development server, undermining trust in the software supply chain and increasing the risk of supply chain attacks. The vulnerability also raises compliance concerns under European data protection regulations if sensitive personal data or credentials are exposed.

Mitigation Recommendations

European organizations should immediately upgrade vite-plugin-react to version 0.5.6 or later to remediate the vulnerability. Development servers should not be exposed to external networks; avoid using the vite --host option to bind the server to all network interfaces unless strictly necessary and secured. Implement network segmentation and firewall rules to restrict access to development servers to trusted internal IP addresses only. Use VPNs or secure tunnels for remote development access instead of exposing dev servers publicly. Regularly audit development environments for exposed services and monitor network traffic for unusual access patterns. Employ strict access controls and multi-factor authentication for developer machines and environments. Additionally, review and sanitize any dynamic import usage in custom server functions to prevent unsafe code execution. Incorporate security scanning tools into the CI/CD pipeline to detect vulnerable dependencies and enforce timely patching. Finally, educate development teams about the risks of exposing development servers and best practices for secure development.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-08T18:02:08.847Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693890dd52fe50f9a48c9bdf

Added to database: 12/9/2025, 9:13:01 PM

Last enriched: 12/16/2025, 10:11:14 PM

Last updated: 2/7/2026, 11:10:18 AM

Views: 265

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats