{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T06:12:24.664","vulnerabilities":[{"cve":{"id":"CVE-2025-24010","sourceIdentifier":"security-advisories@github.com","published":"2025-01-20T16:15:28.730","lastModified":"2025-09-19T18:35:59.963","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6."},{"lang":"es","value":"Vite es una herramienta de interfaz framework para JavaScript. Vite permitía que cualquier sitio web enviara solicitudes al servidor de desarrollo y leyera la respuesta debido a la configuración CORS predeterminada y la falta de validación en el encabezado Origin para las conexiones WebSocket. Esta vulnerabilidad se solucionó en 6.0.9, 5.4.12 y 4.5.6."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:N\/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-346"},{"lang":"en","value":"CWE-350"},{"lang":"en","value":"CWE-1385"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*","versionEndExcluding":"4.5.5","matchCriteriaId":"6A418E00-E3DD-4461-96A8-BC4C22E98F75"},{"vulnerable":true,"criteria":"cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.4.12","matchCriteriaId":"70C30FA0-1314-408F-A85B-BB3335EC6163"},{"vulnerable":true,"criteria":"cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.9","matchCriteriaId":"99D0A251-3C65-4F9F-AD23-B3C3E3DEC93D"}]}]}],"references":[{"url":"https:\/\/github.com\/vitejs\/vite\/security\/advisories\/GHSA-vg6x-rcgg-rjx6","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Third Party Advisory"]}]}}]}