CVE-2025-24360

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24360
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-24360.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-24360
Aliases
Related
Published
2025-01-25T00:49:09Z
Modified
2025-10-30T20:32:02.681477Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Opening a malicious website while running a Nuxt dev server could allow read-only access to code
Details

Nuxt is an open-source web development framework for Vue.js. Starting in version 3.8.1 and prior to version 3.15.3, Nuxt allows any websites to send any requests to the development server and read the response due to default CORS settings. Users with the default server.cors option using Vite builder may get the source code stolen by malicious websites. Version 3.15.3 fixes the vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-200"
    ]
}
References

Affected packages

Git / github.com/nuxt/nuxt

Affected ranges

Type
GIT
Repo
https://github.com/nuxt/nuxt
Events

Affected versions

@nuxt/ui-assets@0.*

@nuxt/ui-assets@0.1.0
@nuxt/ui-assets@0.2.0
@nuxt/ui-assets@0.2.1

@nuxt/ui-templates@0.*

@nuxt/ui-templates@0.1.0
@nuxt/ui-templates@0.1.1
@nuxt/ui-templates@0.2.0
@nuxt/ui-templates@0.2.1
@nuxt/ui-templates@0.2.2
@nuxt/ui-templates@0.3.0
@nuxt/ui-templates@0.3.1
@nuxt/ui-templates@0.3.2
@nuxt/ui-templates@0.3.3
@nuxt/ui-templates@0.4.0

@nuxt/ui-templates@1.*

@nuxt/ui-templates@1.1.0
@nuxt/ui-templates@1.1.1
@nuxt/ui-templates@1.2.0
@nuxt/ui-templates@1.2.1
@nuxt/ui-templates@1.3.0
@nuxt/ui-templates@1.3.1
@nuxt/ui-templates@1.3.2
@nuxt/ui-templates@1.3.3

@nuxt/ui@0.*

@nuxt/ui@0.1.0
@nuxt/ui@0.1.1
@nuxt/ui@0.2.0
@nuxt/ui@0.3.0
@nuxt/ui@0.3.1
@nuxt/ui@0.3.2
@nuxt/ui@0.3.3
@nuxt/ui@0.4.0
@nuxt/ui@0.4.1

v3.*

v3.10.0
v3.10.1
v3.10.2
v3.10.3
v3.11.0
v3.11.1
v3.11.2
v3.12.0
v3.12.1
v3.12.2
v3.12.3
v3.12.4
v3.13.0
v3.13.1
v3.13.2
v3.14.0
v3.14.159
v3.14.1592
v3.15.0
v3.15.1
v3.15.2
v3.8.1
v3.8.2
v3.9.0
v3.9.1
v3.9.2
v3.9.3