Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23413 | @nestjs/devtools-integration: CSRF to Sandbox Escape Allows for RCE against JS Developers |
Github GHSA |
GHSA-85cg-cmq5-qjm7 | @nestjs/devtools-integration: CSRF to Sandbox Escape Allows for RCE against JS Developers |
Thu, 09 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nestjs:devtools-integration:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
Tue, 05 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nestjs
Nestjs devtools-integration |
|
| Vendors & Products |
Nestjs
Nestjs devtools-integration |
Mon, 04 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 02 Aug 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1. | |
| Title | @nestjs/devtools-integration's CSRF to Sandbox Escape Allows for RCE against JS Developers | |
| Weaknesses | CWE-352 CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-04T15:23:30.116Z
Reserved: 2025-07-29T16:50:28.391Z
Link: CVE-2025-54782
Updated: 2025-08-04T15:23:18.309Z
Status : Analyzed
Published: 2025-08-02T00:15:25.953
Modified: 2025-10-09T17:31:16.827
Link: CVE-2025-54782
No data.
OpenCVE Enrichment
Updated: 2025-08-05T11:39:04Z
EUVD
Github GHSA