Skip to content

Conversation

diordiordiordior
Copy link

Hi team,

During a review using Semgrep, I identified a critical security vulnerability affecting this repository's development dependencies.

Issue: vitest@2.1.1 is affected by CVE-2025-24964, which allows Remote Code Execution (RCE) via Cross-site WebSocket Hijacking (CSWSH) when the Vitest API server is running and a developer visits a malicious website.

Severity: Critical — no origin validation allows arbitrary WebSocket connections to trigger test runner commands and potentially execute arbitrary code on a dev machine.

Likelihood: Medium to High. Many dev setups run vitest --watch or enable its UI/API server by default. Exploitation only requires a developer to visit a malicious website while the test server is active.

Recommended Fix: Upgrade to vitest >= 2.1.9 (or preferably 3.0.5) where this issue has been patched.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants