Description
webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `Origin` header is checked to prevent Cross-site WebSocket hijacking from happening, which was reported by CVE-2018-14732. But webpack-dev-server always allows IP address `Origin` headers. This allows websites that are served on IP addresses to connect WebSocket. An attacker can obtain source code via a method similar to that used to exploit CVE-2018-14732. Version 5.2.1 contains a patch for the issue.
Published: 2025-06-03
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16764 webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser
Github GHSA Github GHSA GHSA-9jgg-88mc-972h webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser
History

Fri, 03 Oct 2025 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Webpack.js
Webpack.js webpack-dev-server
CPEs cpe:2.3:a:webpack.js:webpack-dev-server:*:*:*:*:*:*:*:*
Vendors & Products Webpack.js
Webpack.js webpack-dev-server

Fri, 06 Jun 2025 19:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 03 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Jun 2025 18:00:00 +0000

Type Values Removed Values Added
Description webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `Origin` header is checked to prevent Cross-site WebSocket hijacking from happening, which was reported by CVE-2018-14732. But webpack-dev-server always allows IP address `Origin` headers. This allows websites that are served on IP addresses to connect WebSocket. An attacker can obtain source code via a method similar to that used to exploit CVE-2018-14732. Version 5.2.1 contains a patch for the issue.
Title webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser
Weaknesses CWE-346
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

Webpack.js Webpack-dev-server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-06-03T17:58:12.605Z

Reserved: 2025-03-21T14:12:06.271Z

Link: CVE-2025-30360

cve-icon Vulnrichment

Updated: 2025-06-03T17:57:55.548Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-03T18:15:25.410

Modified: 2025-11-21T18:26:18.640

Link: CVE-2025-30360

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-06-03T17:41:59Z

Links: CVE-2025-30360 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses