Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2026-39365Path Traversal in Vite-plus

Severity
6.3MEDIUMNVD
EPSS
1.3%
top 19.91%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 7

Description

Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, the dev server’s handling of .map requests for optimized dependencies resolves file paths and calls readFile without restricting ../ segments in the URL. As a result, it is possible to bypass the server.fs.strict allow list and retrieve .map files located outside the project root, provided they can be parsed as valid source map JSON. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages3 packages

npmvitejs/vite8.0.08.0.5+2
CVEListV5vitejs/vite-plus< 0.1.16
CVEListV5vitejs/vite>= 6.0.0, < 6.4.2, >= 7.0.0, < 7.3.2, >= 8.0.0, < 8.0.5+2

🔴Vulnerability Details

2
GHSA
Vite Vulnerable to Path Traversal in Optimized Deps `.map` Handling2026-04-06
OSV
Vite Vulnerable to Path Traversal in Optimized Deps `.map` Handling2026-04-06

💥Exploits & PoCs

1
Nuclei
Vite Dev Server - Path Traversal in Optimized Deps .map Handling

📋Vendor Advisories

1
Red Hat
vite: Vite: Information disclosure via path traversal in dev server's .map request handling2026-04-07

🕵️Threat Intelligence

1
Wiz
CVE-2026-39365 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

4
Bugzilla
CVE-2026-39365 forgejo: Vite: Information disclosure via path traversal in dev server's .map request handling [epel-all]2026-04-07
Bugzilla
CVE-2026-39365 vite: Vite: Information disclosure via path traversal in dev server's .map request handling2026-04-07
Bugzilla
CVE-2026-39365 forgejo: Vite: Information disclosure via path traversal in dev server's .map request handling [fedora-all]2026-04-07
Bugzilla
CVE-2026-39365 nodejs-aw-webui: Vite: Information disclosure via path traversal in dev server's .map request handling [fedora-all]2026-04-07