{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T05:41:40.018","vulnerabilities":[{"cve":{"id":"CVE-2025-24963","sourceIdentifier":"security-advisories@github.com","published":"2025-02-04T20:15:50.330","lastModified":"2025-12-31T14:44:35.500","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handler from remote to get the content of arbitrary files.This `__screenshot-error` handler on the browser mode HTTP server responds any file on the file system. This code was added by commit `2d62051`. Users explicitly exposing the browser mode server to the network by `browser.api.host: true` may get any files exposed. This issue has been addressed in versions 2.1.9 and 3.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Vitest es un framework de prueba desarrollado por Vite. El controlador `__screenshot-error` en el servidor HTTP en modo navegador que responde a cualquier archivo en el archivo sistema. Especialmente si el servidor está expuesto en la red por `browser.api.host: true`, un atacante puede enviar una solicitud a ese controlador desde el control remoto para obtener el contenido de archivos arbitrarios. Este controlador `__screenshot-error` en el servidor HTTP en modo navegador responde a cualquier archivo en el tallo sistema. Este código fue agregado por commit `2d62051`. Los usuarios que expongan explícitamente el servidor en modo navegador a la red por `browser.api.host: true` pueden exponer cualquier archivo. Este problema se ha solucionado en las versiones 2.1.9 y 3.0.4. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vitest.dev:vitest:*:*:*:*:*:node.js:*:*","versionEndExcluding":"2.1.9","matchCriteriaId":"31961E55-DAC5-48C9-B898-C4A599CBA16C"},{"vulnerable":true,"criteria":"cpe:2.3:a:vitest.dev:vitest:*:*:*:*:*:node.js:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.4","matchCriteriaId":"A893513F-DF30-43A8-BB79-1AEFA593AFB5"}]}]}],"references":[{"url":"https:\/\/github.com\/vitest-dev\/vitest\/blob\/f17918a79969d27a415f70431e08a9445b051e45\/packages\/browser\/src\/node\/plugin.ts#L88-L130","source":"security-advisories@github.com","tags":["Product"]},{"url":"https:\/\/github.com\/vitest-dev\/vitest\/commit\/2d62051f13b4b0939b2f7e94e88006d830dc4d1f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https:\/\/github.com\/vitest-dev\/vitest\/security\/advisories\/GHSA-8gvc-j273-4wm5","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https:\/\/vitest.dev\/guide\/browser\/config.html#browser-api","source":"security-advisories@github.com","tags":["Product"]}]}}]}