Executive Summary
No expansive public description is actively mapped to this vulnerability payload yet.
Quantitative Risk Analysis
Attack Vector Profile
The payload vectors broken down by magnitude impact and ease-of-deployment factor mapping.
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:HWhat This Means For Your System
Each point below is derived directly from this CVE's CVSS v3.1 vector — not editorial opinion.
Exploitable remotely over the internet — no physical or local access needed.
Requires specific conditions outside attacker control, reducing repeatability.
A basic authenticated account is sufficient to trigger this.
No user interaction required — the attacker acts autonomously.
Successful exploitation causes: total service availability loss, partial information disclosure, limited data modification.
Remediation Commands
Commands to update each affected package identified in this advisory. Verify the target release explicitly addresses this CVE in the upstream changelog before deploying to production.
npm install vite@latestnpm install vite@latestnpm install vite@latestnpm install vite@latestnpm install vite@latestnpm install vite@latest