Bug 2370072 (CVE-2025-30359) - CVE-2025-30359 webpack-dev-server: webpack-dev-server information exposure
Summary: CVE-2025-30359 webpack-dev-server: webpack-dev-server information exposure
Keywords:
Status: NEW
Alias: CVE-2025-30359
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2370096 2370098 2370100 2370102 2370110 2370112 2370114 2370090 2370092 2370094 2370104 2370106 2370108 2370116
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-03 18:01 UTC by OSIDB Bzimport
Modified: 2025-06-17 08:28 UTC (History)
93 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-03 18:01:31 UTC
webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when they access a malicious web site. Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject a malicious script in their site and run the script. Note that the attacker has to know the port and the output entrypoint script path. Combined with prototype pollution, the attacker can get a reference to the webpack runtime variables. By using `Function::toString` against the values in `__webpack_modules__`, the attacker can get the source code. Version 5.2.1 contains a patch for the issue.


Note You need to log in before you can comment on or make changes to this bug.