webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when they access a malicious web site. Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject a malicious script in their site and run the script. Note that the attacker has to know the port and the output entrypoint script path. Combined with prototype pollution, the attacker can get a reference to the webpack runtime variables. By using `Function::toString` against the values in `__webpack_modules__`, the attacker can get the source code. Version 5.2.1 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Jun 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 03 Jun 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 03 Jun 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when they access a malicious web site. Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject a malicious script in their site and run the script. Note that the attacker has to know the port and the output entrypoint script path. Combined with prototype pollution, the attacker can get a reference to the webpack runtime variables. By using `Function::toString` against the values in `__webpack_modules__`, the attacker can get the source code. Version 5.2.1 contains a patch for the issue. | |
Title | webpack-dev-server users' source code may be stolen when they access a malicious web site | |
Weaknesses | CWE-749 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-03T17:39:16.531Z
Updated: 2025-06-03T17:50:03.130Z
Reserved: 2025-03-21T14:12:06.271Z
Link: CVE-2025-30359

Updated: 2025-06-03T17:49:52.996Z

Status : Awaiting Analysis
Published: 2025-06-03T18:15:25.243
Modified: 2025-06-04T14:54:33.783
Link: CVE-2025-30359
