Anonymous Intelligence Signal

Webpack Dev Server Major Update Flags Critical Supply Chain Risk: CVE-2025-30359

human The Lab unverified 2026-04-15 15:22:44 Source: GitHub Issues

A major version update for the widely used webpack-dev-server package is being flagged as a security priority, driven by a newly disclosed vulnerability, CVE-2025-30359. The automated dependency management PR highlights a jump from version 3.11.2 to 5.0.0, a significant leap that underscores the severity of the underlying flaw. This is not a routine patch; it's a forced migration prompted by a security advisory that warns of active exploitation risks.

The core of the vulnerability lies in how the dev server handles classic script requests. According to the GitHub security advisory, because requests for classic scripts via a `<script>` tag are not subject to the same-origin policy, an attacker can potentially exfiltrate source code when a developer accesses a malicious website. This creates a direct path for intellectual property theft from development environments, targeting the very tools used to build applications. The Renovate bot's update carries high merge confidence, signaling that the community considers the upgrade path stable and necessary.

The implications ripple across the entire JavaScript and web development ecosystem. Any project using an outdated webpack-dev-server for local development is potentially exposed. This vulnerability turns a standard development workflow—running a local server and browsing the web—into a potential attack vector. It pressures development teams to audit their dependencies immediately and execute a major version upgrade, a process that can introduce breaking changes and require significant testing, all under the clock of a public CVE.