Логотип exploitDog
bind:CVE-2025-54782
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-54782

Количество 3

Количество 3

nvd логотип

CVE-2025-54782

6 месяцев назад

Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-85cg-cmq5-qjm7

6 месяцев назад

@nestjs/devtools-integration: CSRF to Sandbox Escape Allows for RCE against JS Developers

EPSS: Средний
fstec логотип

BDU:2025-13414

6 месяцев назад

Уязвимость пакета интеграции devtools-integration платформы Nest для создания масштабируемых серверных приложений Node.js, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.6
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-54782

Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.

CVSS3: 8.8
24%
Средний
6 месяцев назад
github логотип
GHSA-85cg-cmq5-qjm7

@nestjs/devtools-integration: CSRF to Sandbox Escape Allows for RCE against JS Developers

24%
Средний
6 месяцев назад
fstec логотип
BDU:2025-13414

Уязвимость пакета интеграции devtools-integration платформы Nest для создания масштабируемых серверных приложений Node.js, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.6
24%
Средний
6 месяцев назад

Уязвимостей на страницу