{"vulnerability": "CVE-2025-24010", "sightings": [{"uuid": "fe21ae92-f5d8-42b7-8046-1f2dfbcff9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24010", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113861495371199240", "content": "", "creation_timestamp": "2025-01-20T15:55:40.971679Z"}, {"uuid": "312d41db-fd5d-4133-8ee2-94981d8afd0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24010", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lg6qdyvs5b2n", "content": "", "creation_timestamp": "2025-01-20T16:16:08.227269Z"}, {"uuid": "ff8d8bbd-8515-4384-8abc-7891f7b9b92d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24010", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lg6sigrjjk2b", "content": "", "creation_timestamp": "2025-01-20T16:54:26.593123Z"}, {"uuid": "3eae71a6-5e75-432a-a382-62b37bda8a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24010", "type": "seen", "source": "https://t.me/cvedetector/15895", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24010 - Vite WebSocket CORS Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-24010 \nPublished : Jan. 20, 2025, 4:15 p.m. | 43\u00a0minutes ago \nDescription : Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-20T18:23:21.000000Z"}, {"uuid": "0262112e-d1de-4ec0-8b9d-7d8eb8d4f3d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24010", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2362", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24010\n\ud83d\udd39 Description: Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6.\n\ud83d\udccf Published: 2025-01-20T15:53:30.929Z\n\ud83d\udccf Modified: 2025-01-20T15:53:30.929Z\n\ud83d\udd17 References:\n1. https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6", "creation_timestamp": "2025-01-20T16:01:41.000000Z"}]}