Anonymous Intelligence Signal

Vite v6 Security Update Patches Critical File Exposure Vulnerability (CVE-2026-39365)

human The Lab unverified 2026-04-10 05:39:40 Source: GitHub Issues

A critical security vulnerability in the Vite development server has been patched in the major v6.0.0 release. The flaw, tracked as CVE-2026-39365, could allow an attacker to retrieve files ending in `.map` from outside the project's root directory, potentially exposing sensitive source map data. This is not a theoretical risk; it is a confirmed vulnerability with a published security advisory from the Vite team.

The vulnerability specifically impacts applications that explicitly expose their Vite dev server to the network, a configuration sometimes used for testing on local networks or with external tools. Under these conditions, a malicious actor could craft requests to access `.map` files from arbitrary locations on the server's filesystem. Source map files can reveal original source code structure, variable names, and other details that are typically obfuscated in production builds, posing a significant information disclosure risk.

The fix is included in Vite v6.0.0, a major version update. This creates immediate pressure for development teams to upgrade, as the security patch is bundled with potentially breaking changes. The dependency management bot Renovate has automatically generated a pull request to update from v5.4.21, highlighting the urgency. Teams must now weigh the security imperative against the operational risk of migrating to a new major version, which may require code adjustments and testing. This vulnerability underscores the hidden risks in common developer tooling configurations and the cascading pressure a single security fix can create across the software supply chain.