CVE-2026-39363: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in vitejs vite
CVE-2026-39363 is a high-severity vulnerability in the Vite frontend tooling framework versions 6. 0. 0 to before 6. 4. 2, 7. 0. 0 to before 7. 3. 2, and 8. 0.
AI Analysis
Technical Summary
Vite versions 6.0.0 to before 6.4.2, 7.0.0 to before 7.3.2, and 8.0.0 to before 8.0.5 contain a vulnerability where an attacker can connect to the dev server's WebSocket without an Origin header and use the vite:invoke event to call fetchModule. This allows combining file:// URLs with ?raw or ?inline query parameters to retrieve arbitrary file contents from the server as JavaScript strings. The vulnerability arises because access control mechanisms applied to HTTP requests (e.g., server.fs.allow) do not apply to this WebSocket-based execution path. The issue is resolved in versions 6.4.2, 7.3.2, and 8.0.5.
Potential Impact
An attacker can expose sensitive information by reading arbitrary files on the server hosting the Vite development server. This could lead to disclosure of source code, configuration files, or other sensitive data accessible to the server process. The vulnerability does not require privileges or user interaction and can be exploited remotely over the network. No known active exploitation has been reported.
Mitigation Recommendations
This vulnerability is fixed in Vite versions 6.4.2, 7.3.2, and 8.0.5. Users should upgrade to one of these versions or later to remediate the issue. Patch status is confirmed by the version fixes noted in the vulnerability description. No additional mitigations are indicated by the vendor advisory.
CVE-2026-39363: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in vitejs vite
Description
CVE-2026-39363 is a high-severity vulnerability in the Vite frontend tooling framework versions 6. 0. 0 to before 6. 4. 2, 7. 0. 0 to before 7. 3. 2, and 8. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Vite versions 6.0.0 to before 6.4.2, 7.0.0 to before 7.3.2, and 8.0.0 to before 8.0.5 contain a vulnerability where an attacker can connect to the dev server's WebSocket without an Origin header and use the vite:invoke event to call fetchModule. This allows combining file:// URLs with ?raw or ?inline query parameters to retrieve arbitrary file contents from the server as JavaScript strings. The vulnerability arises because access control mechanisms applied to HTTP requests (e.g., server.fs.allow) do not apply to this WebSocket-based execution path. The issue is resolved in versions 6.4.2, 7.3.2, and 8.0.5.
Potential Impact
An attacker can expose sensitive information by reading arbitrary files on the server hosting the Vite development server. This could lead to disclosure of source code, configuration files, or other sensitive data accessible to the server process. The vulnerability does not require privileges or user interaction and can be exploited remotely over the network. No known active exploitation has been reported.
Mitigation Recommendations
This vulnerability is fixed in Vite versions 6.4.2, 7.3.2, and 8.0.5. Users should upgrade to one of these versions or later to remediate the issue. Patch status is confirmed by the version fixes noted in the vulnerability description. No additional mitigations are indicated by the vendor advisory.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-06T21:29:17.349Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d55f07aaed68159a562941
Added to database: 4/7/2026, 7:46:15 PM
Last enriched: 4/15/2026, 12:39:30 PM
Last updated: 5/22/2026, 10:13:13 AM
Views: 189
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.