Skip to content

- Update dependency vite to v6.4.2 [SECURITY] - autoclosed#587

Closed
blumilk-renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-vite-vulnerability
Closed

- Update dependency vite to v6.4.2 [SECURITY] - autoclosed#587
blumilk-renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-vite-vulnerability

Conversation

@blumilk-renovate
Copy link
Copy Markdown
Contributor

This PR contains the following updates:

Package Change Age Confidence
vite (source) 6.4.1 -> 6.4.2 age confidence

GitHub Vulnerability Alerts

CVE-2026-39363

Summary

server.fs check was not enforced to the fetchModule method that is exposed in Vite dev server's WebSocket.

Impact

Only apps that match the following conditions are affected:

  • explicitly exposes the Vite dev server to the network (using --host or server.host config option)
  • WebSocket is not disabled by server.ws: false

Arbitrary files on the server (development machine, CI environment, container, etc.) can be exposed.

Details

If it is possible to connect to the Vite dev server’s WebSocket without an Origin header, an attacker can invoke fetchModule via the custom WebSocket event vite:invoke and combine file://... with ?raw (or ?inline) to retrieve the contents of arbitrary files on the server as a JavaScript string (e.g., export default "...").

The access control enforced in the HTTP request path (such as server.fs.allow) is not applied to this WebSocket-based execution path.

PoC

  1. Start the dev server on the target
    Example (used during validation with this repository):

    pnpm -C playground/alias exec vite --host 0.0.0.0 --port 5173
  2. Confirm that access is blocked via the HTTP path (example: arbitrary file)

    curl -i 'http://localhost:5173/@​fs/etc/passwd?raw'

    Result: 403 Restricted (outside the allow list)
    image

  3. Confirm that the same file can be retrieved via the WebSocket path
    By connecting to the HMR WebSocket without an Origin header and sending a vite:invoke request that calls fetchModule with a file://... URL and ?raw, the file contents are returned as a JavaScript module.

image image

Release Notes

vitejs/vite (vite)

v6.4.2

Compare Source

Please refer to CHANGELOG.md for details.


Configuration

📅 Schedule: Branch creation - "" in timezone Europe/Warsaw, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@blumilk-renovate blumilk-renovate bot requested a review from a team as a code owner April 7, 2026 10:12
@blumilk-renovate blumilk-renovate bot added dependencies Pull requests that update a dependency file renovate security security related stuff labels Apr 7, 2026
@blumilk-renovate blumilk-renovate bot requested a review from Blusia April 7, 2026 10:12
@blumilk-renovate blumilk-renovate bot changed the title - Update dependency vite to v6.4.2 [SECURITY] - Update dependency vite to v6.4.2 [SECURITY] - autoclosed Apr 8, 2026
@blumilk-renovate blumilk-renovate bot closed this Apr 8, 2026
@blumilk-renovate blumilk-renovate bot deleted the renovate/npm-vite-vulnerability branch April 8, 2026 10:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file renovate security security related stuff

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants