Vite is a frontend tooling framework for JavaScript. In versions from 2.9.18 to before 3.0.0, 3.2.9 to before 4.0.0, 4.5.3 to before 5.0.0, 5.2.6 to before 5.4.21, 6.0.0 to before 6.4.1, 7.0.0 to before 7.0.8, and 7.1.0 to before 7.1.11, files denied by server.fs.deny were sent if the URL ended with \ when the dev server is running on Windows. Only apps explicitly exposing the Vite dev server to the network and running the dev server on Windows were affected. This issue has been patched in versions 5.4.21, 6.4.1, 7.0.8, and 7.1.11.
History

Wed, 22 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Vitejs
Vitejs vite
Vendors & Products Microsoft
Microsoft windows
Vitejs
Vitejs vite

Mon, 20 Oct 2025 20:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Description Vite is a frontend tooling framework for JavaScript. In versions from 2.9.18 to before 3.0.0, 3.2.9 to before 4.0.0, 4.5.3 to before 5.0.0, 5.2.6 to before 5.4.21, 6.0.0 to before 6.4.1, 7.0.0 to before 7.0.8, and 7.1.0 to before 7.1.11, files denied by server.fs.deny were sent if the URL ended with \ when the dev server is running on Windows. Only apps explicitly exposing the Vite dev server to the network and running the dev server on Windows were affected. This issue has been patched in versions 5.4.21, 6.4.1, 7.0.8, and 7.1.11.
Title vite allows server.fs.deny bypass via backslash on Windows
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-10-20T19:57:13.188Z

Updated: 2025-10-20T20:17:08.287Z

Reserved: 2025-10-15T15:03:28.135Z

Link: CVE-2025-62522

cve-icon Vulnrichment

Updated: 2025-10-20T20:17:04.944Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-20T20:15:37.427

Modified: 2025-10-21T19:31:25.450

Link: CVE-2025-62522

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-20T19:57:13Z

Links: CVE-2025-62522 - Bugzilla