Skip to content

vitest-1.0.4.tgz: 1 vulnerabilities (highest severity is: 9.6) #79

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - vitest-1.0.4.tgz

Library home page: https://registry.npmjs.org/vitest/-/vitest-1.0.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /package.json

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (vitest version) Remediation Possible**
CVE-2025-24964 Critical 9.6 vitest-1.0.4.tgz Direct vitest - 1.6.1,2.1.9,3.0.5

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-24964

Vulnerable Library - vitest-1.0.4.tgz

Library home page: https://registry.npmjs.org/vitest/-/vitest-1.0.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /package.json

Dependency Hierarchy:

  • vitest-1.0.4.tgz (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Vitest is a testing framework powered by Vite. Affected versions are subject to arbitrary remote Code Execution when accessing a malicious website while Vitest API server is listening by Cross-site WebSocket hijacking (CSWSH) attacks. When "api" option is enabled (Vitest UI enables it), Vitest starts a WebSocket server. This WebSocket server did not check Origin header and did not have any authorization mechanism and was vulnerable to CSWSH attacks. This WebSocket server has "saveTestFile" API that can edit a test file and "rerun" API that can rerun the tests. An attacker can execute arbitrary code by injecting a code in a test file by the "saveTestFile" API and then running that file by calling the "rerun" API. This vulnerability can result in remote code execution for users that are using Vitest serve API. This issue has been patched in versions 1.6.1, 2.1.9 and 3.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: 2025-02-04

URL: CVE-2025-24964

CVSS 3 Score Details (9.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-9crc-q9x8-hgqq

Release Date: 2025-02-04

Fix Resolution: vitest - 1.6.1,2.1.9,3.0.5

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions