Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3168 | Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-92r3-m2mg-pj97 | Vite XSS vulnerability in `server.transformIndexHtml` via URL payload |
Thu, 29 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-29T13:40:53.278Z
Reserved: 2023-11-24T16:45:24.313Z
Link: CVE-2023-49293
Updated: 2024-08-02T21:53:44.657Z
Status : Modified
Published: 2023-12-04T23:15:27.730
Modified: 2024-11-21T08:33:12.293
Link: CVE-2023-49293
OpenCVE Enrichment
No data.
EUVD
Github GHSA