Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67489: CWE-94: Improper Control of Generation of Code ('Code Injection') in vitejs vite-plugin-react

0
Critical
VulnerabilityCVE-2025-67489cvecve-2025-67489cwe-94
Published: Tue Dec 09 2025 (12/09/2025, 20:54:23 UTC)
Source: CVE Database V5
Vendor/Project: vitejs
Product: vite-plugin-react

Description

@vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Versions 0.5.5 and below are vulnerable to arbitrary remote code execution on the development server through unsafe dynamic imports in server function APIs (loadServerAction, decodeReply, decodeAction) when integrated into RSC applications that expose server function endpoints. Attackers with network access to the development server can read/modify files, exfiltrate sensitive data (source code, environment variables, credentials), or pivot to other internal services. While this affects development servers only, the risk increases when using vite --host to expose the server on all network interfaces. This issue is fixed in version 0.5.6.

AI-Powered Analysis

AILast updated: 12/09/2025, 21:27:50 UTC

Technical Analysis

CVE-2025-67489 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting vite-plugin-react versions below 0.5.6. This plugin provides React Server Components (RSC) support for the Vite build tool. The vulnerability stems from unsafe dynamic imports within server function APIs such as loadServerAction, decodeReply, and decodeAction. These APIs are used in RSC applications that expose server function endpoints on the development server. An attacker with network access to the development server can exploit this flaw to perform arbitrary remote code execution (RCE) without requiring authentication or user interaction. This allows the attacker to read or modify files on the development server, exfiltrate sensitive data including source code, environment variables, and credentials, and potentially pivot to other internal services. The vulnerability is particularly dangerous when the development server is launched with the vite --host option, which exposes the server on all network interfaces, increasing the attack surface. Although the vulnerability affects only development servers and not production environments, the exposure of sensitive intellectual property and credentials can have significant downstream consequences. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The issue was publicly disclosed on December 9, 2025, and fixed in vite-plugin-react version 0.5.6. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to development environments that use vite-plugin-react versions prior to 0.5.6. The ability to execute arbitrary code remotely on development servers can lead to theft of proprietary source code, exposure of environment variables containing secrets, and unauthorized modification of development assets. This can result in intellectual property loss, compromise of credentials that may be reused in production environments, and potential lateral movement to internal services, escalating the breach impact. Organizations with remote or distributed development teams who expose development servers on public or internal networks using the vite --host option are at heightened risk. The impact extends beyond confidentiality to integrity and availability, as attackers could alter code or disrupt development workflows. Given the critical CVSS score and the ease of exploitation without authentication, European software development companies, technology firms, and any enterprises relying on Vite-based React development tools must prioritize remediation to prevent potential breaches and intellectual property theft.

Mitigation Recommendations

1. Immediately upgrade vite-plugin-react to version 0.5.6 or later to apply the official patch that fixes this vulnerability. 2. Avoid exposing development servers to untrusted networks; do not use the vite --host option to bind the development server to all network interfaces unless absolutely necessary and secured. 3. Restrict network access to development servers using firewall rules or VPNs to limit exposure only to trusted developers. 4. Implement network segmentation to isolate development environments from production and sensitive internal services to reduce lateral movement risk. 5. Regularly audit development environments for unauthorized access or suspicious activity. 6. Educate development teams about the risks of exposing development servers publicly and enforce secure development environment policies. 7. Consider using ephemeral or containerized development environments that can be quickly rebuilt to reduce persistent attack surfaces. 8. Monitor for updates from the vitejs project and subscribe to security advisories to stay informed about future vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-08T18:02:08.847Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693890dd52fe50f9a48c9bdf

Added to database: 12/9/2025, 9:13:01 PM

Last enriched: 12/9/2025, 9:27:50 PM

Last updated: 12/11/2025, 6:34:37 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats