First published: Wed Apr 30 2025(Updated: )
### Summary The contents of files in [the project `root`](https://vite.dev/config/shared-options.html#root) that are denied by a file matching pattern can be returned to the browser. ### Impact Only apps explicitly exposing the Vite dev server to the network (using --host or [server.host config option](https://vitejs.dev/config/server-options.html#server-host)) are affected. Only files that are under [project `root`](https://vite.dev/config/shared-options.html#root) and are denied by a file matching pattern can be bypassed. - Examples of file matching patterns: `.env`, `.env.*`, `*.{crt,pem}`, `**/.env` - Examples of other patterns: `**/.git/**`, `.git/**`, `.git/**/*` ### Details [`server.fs.deny`](https://vite.dev/config/server-options.html#server-fs-deny) can contain patterns matching against files (by default it includes `.env`, `.env.*`, `*.{crt,pem}` as such patterns). These patterns were able to bypass for files under `root` by using a combination of slash and dot (`/.`). ### PoC ``` npm create vite@latest cd vite-project/ cat "secret" > .env npm install npm run dev curl --request-target /.env/. http://localhost:5173 ```  
Affected Software | Affected Version | How to fix |
---|---|---|
npm/vite | <=4.5.13 | 4.5.14 |
npm/vite | >=5.0.0<=5.4.18 | 5.4.19 |
npm/vite | >=6.0.0<=6.1.5 | 6.1.6 |
npm/vite | >=6.2.0<=6.2.6 | 6.2.7 |
npm/vite | >=6.3.0<=6.3.3 | 6.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GHSA-859w-5945-r5v3 is considered a moderate severity vulnerability.
To fix GHSA-859w-5945-r5v3, upgrade Vite to version 4.5.14, 5.4.19, 6.1.6, 6.2.7, or 6.3.4.
GHSA-859w-5945-r5v3 is caused by the potential exposure of files in the project root due to specific file matching patterns.
Apps that expose the Vite dev server to the network using --host or similar configurations are affected by GHSA-859w-5945-r5v3.
Vite versions from 4.0.0 up to 6.3.3 are affected by GHSA-859w-5945-r5v3.