{"api_version":"1","generated_at":"2026-04-09T20:59:42+00:00","cve":"CVE-2023-34092","urls":{"html":"https://cve.report/CVE-2023-34092","api":"https://cve.report/api/cve/CVE-2023-34092.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-34092","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-34092"},"summary":{"title":"CVE-2023-34092","description":"Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-06-01 17:15:00","updated_at":"2023-06-09 16:03:00"},"problem_types":["CWE-706"],"metrics":[],"references":[{"url":"https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67","name":"https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67","refsource":"MISC","tags":[],"title":"Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//) · Advisory · vitejs/vite · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/vitejs/vite/pull/13348","name":"https://github.com/vitejs/vite/pull/13348","refsource":"MISC","tags":[],"title":"fix: fs.deny with leading double slash by patak-dev · Pull Request #13348 · vitejs/vite · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32","name":"https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32","refsource":"MISC","tags":[],"title":"fix: fs.deny with leading double slash (#13348) · vitejs/vite@813ddd6 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-34092","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34092","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"34092","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vitejs","cpe5":"vite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"34092","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vitejs","cpe5":"vite","cpe6":"2.9.15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-34092","qid":"996771","title":"NodeJs (Npm) Security Update for vite (GHSA-c24v-8rfc-w8vw)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-34092","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-50: Path Equivalence: '//multiple/leading/slash'","cweId":"CWE-50"}]},{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"vitejs","product":{"product_data":[{"product_name":"vite","version":{"version_data":[{"version_affected":"=","version_value":"< 2.9.16"},{"version_affected":"=","version_value":">= 3.0.2, < 3.2.7"},{"version_affected":"=","version_value":">= 4.0.0, < 4.0.5"},{"version_affected":"=","version_value":">= 4.1.0, < 4.1.5"},{"version_affected":"=","version_value":">= 4.2.0, < 4.2.3"},{"version_affected":"=","version_value":">= 4.3.0, < 4.3.9"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67","refsource":"MISC","name":"https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67"},{"url":"https://github.com/vitejs/vite/pull/13348","refsource":"MISC","name":"https://github.com/vitejs/vite/pull/13348"},{"url":"https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32","refsource":"MISC","name":"https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32"}]},"source":{"advisory":"GHSA-353f-5xf4-qw67","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-06-01 17:15:00","lastModifiedDate":"2023-06-09 16:03:00","problem_types":["CWE-706"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*","versionStartIncluding":"4.3.0","versionEndExcluding":"4.3.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*","versionStartIncluding":"4.2.0","versionEndExcluding":"4.2.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*","versionStartIncluding":"4.1.0","versionEndExcluding":"4.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*","versionStartIncluding":"3.0.2","versionEndExcluding":"3.2.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vitejs:vite:2.9.15:*:*:*:*:node.js:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}