Vite Dev Server Security Flaw Exposes Source Maps to Network Attackers
A critical security vulnerability in the Vite development server allows attackers to access sensitive source map files from outside a project's directory. The flaw, tracked as CVE-2026-39365, enables the server to return any file ending with `.map` to a browser, potentially exposing proprietary code structure and intellectual property. This vulnerability is not a theoretical risk; it is a direct path for reconnaissance and data exfiltration during the development phase.
The issue specifically affects applications that have explicitly exposed their Vite dev server to the network, typically by using the `--host` command-line flag or configuring the `server.host` option. For projects confined to localhost, the risk is mitigated. The advisory from the Vite team mandates an immediate update from version 8.0.3 to the patched version 8.0.5 to close this exposure vector.
This vulnerability places thousands of development environments at immediate risk of targeted scanning. Developers and organizations using Vite must audit their server configurations and apply the patch without delay. The exposure of source maps can provide attackers with a blueprint of an application's architecture, significantly lowering the barrier for subsequent, more damaging attacks. This incident underscores the persistent security challenges in modern web tooling and the critical importance of keeping development dependencies current.