webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `Origin` header is checked to prevent Cross-site WebSocket hijacking from happening, which was reported by CVE-2018-14732. But webpack-dev-server always allows IP address `Origin` headers. This allows websites that are served on IP addresses to connect WebSocket. An attacker can obtain source code via a method similar to that used to exploit CVE-2018-14732. Version 5.2.1 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Jun 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 03 Jun 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 03 Jun 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `Origin` header is checked to prevent Cross-site WebSocket hijacking from happening, which was reported by CVE-2018-14732. But webpack-dev-server always allows IP address `Origin` headers. This allows websites that are served on IP addresses to connect WebSocket. An attacker can obtain source code via a method similar to that used to exploit CVE-2018-14732. Version 5.2.1 contains a patch for the issue. | |
Title | webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser | |
Weaknesses | CWE-346 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-03T17:41:59.457Z
Updated: 2025-06-03T17:58:12.605Z
Reserved: 2025-03-21T14:12:06.271Z
Link: CVE-2025-30360

Updated: 2025-06-03T17:57:55.548Z

Status : Awaiting Analysis
Published: 2025-06-03T18:15:25.410
Modified: 2025-06-04T14:54:33.783
Link: CVE-2025-30360
