Skip to content

[MEDIUM] CVE-2026-39365: Package: vite Installed Version: 7.3.1 Vulnerability CVE-2026-39365 Severity:... #57

@github-actions

Description

@github-actions

🟡 Medium Security Finding

Scanner: Trivy
Rule: CVE-2026-39365
Severity: MEDIUM
File: pnpm-lock.yaml:1

Description

Package: vite
Installed Version: 7.3.1
Vulnerability CVE-2026-39365
Severity: MEDIUM
Fixed Version: 8.0.5, 7.3.2, 6.4.2
Link: CVE-2026-39365

Remediation Guidance

Vulnerability CVE-2026-39365
Severity: MEDIUM
Package: vite
Fixed Version: 8.0.5, 7.3.2, 6.4.2
Link: CVE-2026-39365
Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, the dev server’s handling of .map requests for optimized dependencies resolves file paths and calls readFile without restricting ../ segments in the URL. As a result, it is possible to bypass the server.fs.strict allow list and retrieve .map files located outside the project root, provided they can be parsed as valid source map JSON. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5.

References


This issue was automatically created by repo-sentinel. Assigned to Copilot for an automated fix attempt.

Metadata

Metadata

Assignees

No one assigned

    Labels

    securitySecurity vulnerability finding

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions